Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-32282 (GCVE-0-2026-32282)
Vulnerability from cvelistv5 – Published: 2026-04-08 01:06 – Updated: 2026-04-13 18:20- CWE-61 - UNIX Symbolic Link (Symlink) Following
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Go standard library | internal/syscall/unix |
Affected:
0 , < 1.25.9
(semver)
Affected: 1.26.0-0 , < 1.26.2 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-32282",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-13T17:47:42.666766Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-13T18:20:56.456Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "internal/syscall/unix",
"platforms": [
"linux"
],
"product": "internal/syscall/unix",
"programRoutines": [
{
"name": "Fchmodat"
}
],
"vendor": "Go standard library",
"versions": [
{
"lessThan": "1.25.9",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "1.26.2",
"status": "affected",
"version": "1.26.0-0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Uuganbayar Lkhamsuren (https://github.com/uug4na)"
}
],
"descriptions": [
{
"lang": "en",
"value": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-61: UNIX Symbolic Link (Symlink) Following",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-08T01:06:55.953Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://go.dev/cl/763761"
},
{
"url": "https://go.dev/issue/78293"
},
{
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"title": "TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2026-32282",
"datePublished": "2026-04-08T01:06:55.953Z",
"dateReserved": "2026-03-11T16:38:46.556Z",
"dateUpdated": "2026-04-13T18:20:56.456Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-32282",
"date": "2026-05-05",
"epss": "8e-05",
"percentile": "0.00812"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-32282\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2026-04-08T02:16:03.467\",\"lastModified\":\"2026-04-16T19:15:39.400\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.25.9\",\"matchCriteriaId\":\"C6C9C072-9817-402D-877F-F83584B07017\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.26.0\",\"versionEndExcluding\":\"1.26.2\",\"matchCriteriaId\":\"39FE9BAF-55E9-43AA-B14E-239E7EF1D65D\"}]}]}],\"references\":[{\"url\":\"https://go.dev/cl/763761\",\"source\":\"security@golang.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://go.dev/issue/78293\",\"source\":\"security@golang.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU\",\"source\":\"security@golang.org\",\"tags\":[\"Release Notes\",\"Mailing List\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2026-4864\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-32282\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-13T17:47:42.666766Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-13T17:47:38.773Z\"}}], \"cna\": {\"title\": \"TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix\", \"credits\": [{\"lang\": \"en\", \"value\": \"Uuganbayar Lkhamsuren (https://github.com/uug4na)\"}], \"affected\": [{\"vendor\": \"Go standard library\", \"product\": \"internal/syscall/unix\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.25.9\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.26.0-0\", \"lessThan\": \"1.26.2\", \"versionType\": \"semver\"}], \"platforms\": [\"linux\"], \"packageName\": \"internal/syscall/unix\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"Fchmodat\"}]}], \"references\": [{\"url\": \"https://go.dev/cl/763761\"}, {\"url\": \"https://go.dev/issue/78293\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2026-4864\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-61: UNIX Symbolic Link (Symlink) Following\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2026-04-08T01:06:55.953Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-32282\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-13T18:20:56.456Z\", \"dateReserved\": \"2026-03-11T16:38:46.556Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2026-04-08T01:06:55.953Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:10219
Vulnerability from csaf_redhat - Published: 2026-04-24 02:38 - Updated: 2026-05-06 09:05A flaw was found in the Go programming language (golang) and its command-line tool (cmd/go). A remote attacker could exploit this during the build process by crafting malicious SWIG (Simplified Wrapper and Interface Generator) file names that contain "cgo" and specific payloads. This could lead to code smuggling and arbitrary code execution, bypassing trust mechanisms and allowing the attacker to run unauthorized code.
A flaw was found in the cmd/compile package in the Go standard library. The compiler fails to correctly check for integer overflow or underflow in arithmetic operations involving loop induction variables. As a result, the compiler allows invalid memory indexing to occur at runtime, potentially leading to memory corruption.
A flaw was found in the cmd/compile package in the Go standard library. A no-op interface conversion prevented the compiler from correctly identifying non-overlapping memory moves. As a result, the compiler allows unsafe memory move operations to occur at runtime, potentially causing data corruption, memory corruption or unexpected application behavior.
A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.
A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282)\n\n* crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283)\n\n* crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building (CVE-2026-32280)\n\n* golang: cmd/compile: no-op interface conversion bypasses overlap checking (CVE-2026-27144)\n\n* cmd/go: golang: Go (golang) and cmd/go: Arbitrary Code Execution via malicious SWIG file names (CVE-2026-27140)\n\n* golang: cmd/compile: possible memory corruption after bound check elimination (CVE-2026-27143)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10219",
"url": "https://access.redhat.com/errata/RHSA-2026:10219"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "2456340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456340"
},
{
"category": "external",
"summary": "2456341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456341"
},
{
"category": "external",
"summary": "2456342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456342"
},
{
"category": "external",
"summary": "RHEL-169931",
"url": "https://issues.redhat.com/browse/RHEL-169931"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10219.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-05-06T09:05:31+00:00",
"generator": {
"date": "2026-05-06T09:05:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:10219",
"initial_release_date": "2026-04-24T02:38:10+00:00",
"revision_history": [
{
"date": "2026-04-24T02:38:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-24T02:38:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T09:05:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.9-1.el9_7.aarch64",
"product": {
"name": "go-toolset-0:1.25.9-1.el9_7.aarch64",
"product_id": "go-toolset-0:1.25.9-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.9-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-1.el9_7.aarch64",
"product": {
"name": "golang-0:1.25.9-1.el9_7.aarch64",
"product_id": "golang-0:1.25.9-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.9-1.el9_7.aarch64",
"product": {
"name": "golang-bin-0:1.25.9-1.el9_7.aarch64",
"product_id": "golang-bin-0:1.25.9-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.9-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.9-1.el9_7.aarch64",
"product": {
"name": "golang-race-0:1.25.9-1.el9_7.aarch64",
"product_id": "golang-race-0:1.25.9-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.9-1.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.9-1.el9_7.ppc64le",
"product": {
"name": "go-toolset-0:1.25.9-1.el9_7.ppc64le",
"product_id": "go-toolset-0:1.25.9-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.9-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-1.el9_7.ppc64le",
"product": {
"name": "golang-0:1.25.9-1.el9_7.ppc64le",
"product_id": "golang-0:1.25.9-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.9-1.el9_7.ppc64le",
"product": {
"name": "golang-bin-0:1.25.9-1.el9_7.ppc64le",
"product_id": "golang-bin-0:1.25.9-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.9-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.9-1.el9_7.ppc64le",
"product": {
"name": "golang-race-0:1.25.9-1.el9_7.ppc64le",
"product_id": "golang-race-0:1.25.9-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.9-1.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.9-1.el9_7.x86_64",
"product": {
"name": "go-toolset-0:1.25.9-1.el9_7.x86_64",
"product_id": "go-toolset-0:1.25.9-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.9-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-1.el9_7.x86_64",
"product": {
"name": "golang-0:1.25.9-1.el9_7.x86_64",
"product_id": "golang-0:1.25.9-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.9-1.el9_7.x86_64",
"product": {
"name": "golang-bin-0:1.25.9-1.el9_7.x86_64",
"product_id": "golang-bin-0:1.25.9-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.9-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.9-1.el9_7.x86_64",
"product": {
"name": "golang-race-0:1.25.9-1.el9_7.x86_64",
"product_id": "golang-race-0:1.25.9-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.9-1.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.9-1.el9_7.s390x",
"product": {
"name": "go-toolset-0:1.25.9-1.el9_7.s390x",
"product_id": "go-toolset-0:1.25.9-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.9-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-1.el9_7.s390x",
"product": {
"name": "golang-0:1.25.9-1.el9_7.s390x",
"product_id": "golang-0:1.25.9-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.9-1.el9_7.s390x",
"product": {
"name": "golang-bin-0:1.25.9-1.el9_7.s390x",
"product_id": "golang-bin-0:1.25.9-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.9-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.9-1.el9_7.s390x",
"product": {
"name": "golang-race-0:1.25.9-1.el9_7.s390x",
"product_id": "golang-race-0:1.25.9-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.9-1.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.9-1.el9_7.src",
"product": {
"name": "golang-0:1.25.9-1.el9_7.src",
"product_id": "golang-0:1.25.9-1.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-1.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.9-1.el9_7.noarch",
"product": {
"name": "golang-docs-0:1.25.9-1.el9_7.noarch",
"product_id": "golang-docs-0:1.25.9-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.9-1.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.9-1.el9_7.noarch",
"product": {
"name": "golang-misc-0:1.25.9-1.el9_7.noarch",
"product_id": "golang-misc-0:1.25.9-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.9-1.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.9-1.el9_7.noarch",
"product": {
"name": "golang-src-0:1.25.9-1.el9_7.noarch",
"product_id": "golang-src-0:1.25.9-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.9-1.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.9-1.el9_7.noarch",
"product": {
"name": "golang-tests-0:1.25.9-1.el9_7.noarch",
"product_id": "golang-tests-0:1.25.9-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.9-1.el9_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.9-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64"
},
"product_reference": "go-toolset-0:1.25.9-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.9-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le"
},
"product_reference": "go-toolset-0:1.25.9-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.9-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x"
},
"product_reference": "go-toolset-0:1.25.9-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.9-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64"
},
"product_reference": "go-toolset-0:1.25.9-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64"
},
"product_reference": "golang-0:1.25.9-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le"
},
"product_reference": "golang-0:1.25.9-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x"
},
"product_reference": "golang-0:1.25.9-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-1.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src"
},
"product_reference": "golang-0:1.25.9-1.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64"
},
"product_reference": "golang-0:1.25.9-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.9-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64"
},
"product_reference": "golang-bin-0:1.25.9-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.9-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le"
},
"product_reference": "golang-bin-0:1.25.9-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.9-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x"
},
"product_reference": "golang-bin-0:1.25.9-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.9-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64"
},
"product_reference": "golang-bin-0:1.25.9-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.9-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch"
},
"product_reference": "golang-docs-0:1.25.9-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.9-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch"
},
"product_reference": "golang-misc-0:1.25.9-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.9-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64"
},
"product_reference": "golang-race-0:1.25.9-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.9-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le"
},
"product_reference": "golang-race-0:1.25.9-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.9-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x"
},
"product_reference": "golang-race-0:1.25.9-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.9-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64"
},
"product_reference": "golang-race-0:1.25.9-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.9-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch"
},
"product_reference": "golang-src-0:1.25.9-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.9-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
},
"product_reference": "golang-tests-0:1.25.9-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"cwe": {
"id": "CWE-641",
"name": "Improper Restriction of Names for Files and Other Resources"
},
"discovery_date": "2026-04-08T02:01:26.299804+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456341"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go programming language (golang) and its command-line tool (cmd/go). A remote attacker could exploit this during the build process by crafting malicious SWIG (Simplified Wrapper and Interface Generator) file names that contain \"cgo\" and specific payloads. This could lead to code smuggling and arbitrary code execution, bypassing trust mechanisms and allowing the attacker to run unauthorized code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/go: golang: Go (golang) and cmd/go: Arbitrary Code Execution via malicious SWIG file names",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "RHBZ#2456341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27140",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27140"
},
{
"category": "external",
"summary": "https://go.dev/cl/763768",
"url": "https://go.dev/cl/763768"
},
{
"category": "external",
"summary": "https://go.dev/issue/78335",
"url": "https://go.dev/issue/78335"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4871",
"url": "https://pkg.go.dev/vuln/GO-2026-4871"
}
],
"release_date": "2026-04-08T01:06:57.893000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-24T02:38:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10219"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/go: golang: Go (golang) and cmd/go: Arbitrary Code Execution via malicious SWIG file names"
},
{
"cve": "CVE-2026-27143",
"cwe": {
"id": "CWE-733",
"name": "Compiler Optimization Removal or Modification of Security-critical Code"
},
"discovery_date": "2026-04-08T02:01:29.491546+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456342"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the cmd/compile package in the Go standard library. The compiler fails to correctly check for integer overflow or underflow in arithmetic operations involving loop induction variables. As a result, the compiler allows invalid memory indexing to occur at runtime, potentially leading to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: cmd/compile: possible memory corruption after bound check elimination",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is only exploitable in applications that contain a loop structure that relies on an induction variable. An induction variable is a variable that gets modified, usually incremented or decremented, by a predictable amount on each iteration. Inside the loop, the induction variable must be directly used as the index to access or modify elements within an array or a slice. Additionally, an attacker must be able to cause an integer overflow or underflow in the induction variable to trigger this issue. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "RHBZ#2456342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27143",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27143"
},
{
"category": "external",
"summary": "https://go.dev/cl/763765",
"url": "https://go.dev/cl/763765"
},
{
"category": "external",
"summary": "https://go.dev/issue/78333",
"url": "https://go.dev/issue/78333"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4868",
"url": "https://pkg.go.dev/vuln/GO-2026-4868"
}
],
"release_date": "2026-04-08T01:06:57.168000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-24T02:38:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10219"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, strictly sanitize and enforce bounds checking on any untrusted user input that influences loop counters, iteration limits, or memory indices. If there is no integer overflow or underflow, the out-of-bounds access cannot occur.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: cmd/compile: possible memory corruption after bound check elimination"
},
{
"cve": "CVE-2026-27144",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2026-04-08T02:01:22.896153+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the cmd/compile package in the Go standard library. A no-op interface conversion prevented the compiler from correctly identifying non-overlapping memory moves. As a result, the compiler allows unsafe memory move operations to occur at runtime, potentially causing data corruption, memory corruption or unexpected application behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: cmd/compile: no-op interface conversion bypasses overlap checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable in applications that contain a memory move or copy operation that is subject to a no-op (no-operation) interface conversion. Furthermore, the source and destination memory addresses involved in the move or copy must overlap and an attacker must be able to supply an input that triggers this specific operation. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "RHBZ#2456340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27144"
},
{
"category": "external",
"summary": "https://go.dev/cl/763764",
"url": "https://go.dev/cl/763764"
},
{
"category": "external",
"summary": "https://go.dev/issue/78371",
"url": "https://go.dev/issue/78371"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4867",
"url": "https://pkg.go.dev/vuln/GO-2026-4867"
}
],
"release_date": "2026-04-08T01:06:56.908000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-24T02:38:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10219"
},
{
"category": "workaround",
"details": "To mitigate this issue, review code that performs memory copies or struct assignments. If data is being passed through an interface (such as \u0027any\u0027 or \u0027interface{}\u0027) just before a move operation, refactor the code to use concrete types or explicit pointers instead.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: cmd/compile: no-op interface conversion bypasses overlap checking"
},
{
"cve": "CVE-2026-32280",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-04-08T02:01:19.572351+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456339"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "RHBZ#2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://go.dev/cl/758320",
"url": "https://go.dev/cl/758320"
},
{
"category": "external",
"summary": "https://go.dev/issue/78282",
"url": "https://go.dev/issue/78282"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4947",
"url": "https://pkg.go.dev/vuln/GO-2026-4947"
}
],
"release_date": "2026-04-08T01:06:58.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-24T02:38:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10219"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building"
},
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-24T02:38:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10219"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-32283",
"cwe": {
"id": "CWE-764",
"name": "Multiple Locks of a Critical Resource"
},
"discovery_date": "2026-04-08T02:01:16.213799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "RHBZ#2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"category": "external",
"summary": "https://go.dev/cl/763767",
"url": "https://go.dev/cl/763767"
},
{
"category": "external",
"summary": "https://go.dev/issue/78334",
"url": "https://go.dev/issue/78334"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4870",
"url": "https://pkg.go.dev/vuln/GO-2026-4870"
}
],
"release_date": "2026-04-08T01:06:57.670000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-24T02:38:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10219"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.9-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.9-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.9-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages"
}
]
}
RHSA-2026:10704
Vulnerability from csaf_redhat - Published: 2026-04-27 02:21 - Updated: 2026-05-06 09:05A flaw was found in the Go programming language (golang) and its command-line tool (cmd/go). A remote attacker could exploit this during the build process by crafting malicious SWIG (Simplified Wrapper and Interface Generator) file names that contain "cgo" and specific payloads. This could lead to code smuggling and arbitrary code execution, bypassing trust mechanisms and allowing the attacker to run unauthorized code.
A flaw was found in the cmd/compile package in the Go standard library. The compiler fails to correctly check for integer overflow or underflow in arithmetic operations involving loop induction variables. As a result, the compiler allows invalid memory indexing to occur at runtime, potentially leading to memory corruption.
A flaw was found in the cmd/compile package in the Go standard library. A no-op interface conversion prevented the compiler from correctly identifying non-overlapping memory moves. As a result, the compiler allows unsafe memory move operations to occur at runtime, potentially causing data corruption, memory corruption or unexpected application behavior.
A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.
A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282)\n\n* crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283)\n\n* crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building (CVE-2026-32280)\n\n* golang: cmd/compile: no-op interface conversion bypasses overlap checking (CVE-2026-27144)\n\n* cmd/go: golang: Go (golang) and cmd/go: Arbitrary Code Execution via malicious SWIG file names (CVE-2026-27140)\n\n* golang: cmd/compile: possible memory corruption after bound check elimination (CVE-2026-27143)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10704",
"url": "https://access.redhat.com/errata/RHSA-2026:10704"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "2456340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456340"
},
{
"category": "external",
"summary": "2456341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456341"
},
{
"category": "external",
"summary": "2456342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456342"
},
{
"category": "external",
"summary": "RHEL-169932",
"url": "https://issues.redhat.com/browse/RHEL-169932"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10704.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2026-05-06T09:05:34+00:00",
"generator": {
"date": "2026-05-06T09:05:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:10704",
"initial_release_date": "2026-04-27T02:21:42+00:00",
"revision_history": [
{
"date": "2026-04-27T02:21:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-27T02:21:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T09:05:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=src\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src (go-toolset:rhel8)",
"product_id": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=src\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"product": {
"name": "golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch (go-toolset:rhel8)",
"product_id": "golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"product": {
"name": "golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch (go-toolset:rhel8)",
"product_id": "golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"product": {
"name": "golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch (go-toolset:rhel8)",
"product_id": "golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"product": {
"name": "golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch (go-toolset:rhel8)",
"product_id": "golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64 (go-toolset:rhel8)",
"product_id": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le (go-toolset:rhel8)",
"product_id": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64 (go-toolset:rhel8)",
"product_id": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x (go-toolset:rhel8)",
"product_id": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.9-1.module%2Bel8.10.0%2B24226%2Bc418b32c?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260422204008:a3795dee"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"cwe": {
"id": "CWE-641",
"name": "Improper Restriction of Names for Files and Other Resources"
},
"discovery_date": "2026-04-08T02:01:26.299804+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456341"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go programming language (golang) and its command-line tool (cmd/go). A remote attacker could exploit this during the build process by crafting malicious SWIG (Simplified Wrapper and Interface Generator) file names that contain \"cgo\" and specific payloads. This could lead to code smuggling and arbitrary code execution, bypassing trust mechanisms and allowing the attacker to run unauthorized code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/go: golang: Go (golang) and cmd/go: Arbitrary Code Execution via malicious SWIG file names",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "RHBZ#2456341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27140",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27140"
},
{
"category": "external",
"summary": "https://go.dev/cl/763768",
"url": "https://go.dev/cl/763768"
},
{
"category": "external",
"summary": "https://go.dev/issue/78335",
"url": "https://go.dev/issue/78335"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4871",
"url": "https://pkg.go.dev/vuln/GO-2026-4871"
}
],
"release_date": "2026-04-08T01:06:57.893000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-27T02:21:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/go: golang: Go (golang) and cmd/go: Arbitrary Code Execution via malicious SWIG file names"
},
{
"cve": "CVE-2026-27143",
"cwe": {
"id": "CWE-733",
"name": "Compiler Optimization Removal or Modification of Security-critical Code"
},
"discovery_date": "2026-04-08T02:01:29.491546+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456342"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the cmd/compile package in the Go standard library. The compiler fails to correctly check for integer overflow or underflow in arithmetic operations involving loop induction variables. As a result, the compiler allows invalid memory indexing to occur at runtime, potentially leading to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: cmd/compile: possible memory corruption after bound check elimination",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is only exploitable in applications that contain a loop structure that relies on an induction variable. An induction variable is a variable that gets modified, usually incremented or decremented, by a predictable amount on each iteration. Inside the loop, the induction variable must be directly used as the index to access or modify elements within an array or a slice. Additionally, an attacker must be able to cause an integer overflow or underflow in the induction variable to trigger this issue. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "RHBZ#2456342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27143",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27143"
},
{
"category": "external",
"summary": "https://go.dev/cl/763765",
"url": "https://go.dev/cl/763765"
},
{
"category": "external",
"summary": "https://go.dev/issue/78333",
"url": "https://go.dev/issue/78333"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4868",
"url": "https://pkg.go.dev/vuln/GO-2026-4868"
}
],
"release_date": "2026-04-08T01:06:57.168000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-27T02:21:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10704"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, strictly sanitize and enforce bounds checking on any untrusted user input that influences loop counters, iteration limits, or memory indices. If there is no integer overflow or underflow, the out-of-bounds access cannot occur.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: cmd/compile: possible memory corruption after bound check elimination"
},
{
"cve": "CVE-2026-27144",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2026-04-08T02:01:22.896153+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the cmd/compile package in the Go standard library. A no-op interface conversion prevented the compiler from correctly identifying non-overlapping memory moves. As a result, the compiler allows unsafe memory move operations to occur at runtime, potentially causing data corruption, memory corruption or unexpected application behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: cmd/compile: no-op interface conversion bypasses overlap checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable in applications that contain a memory move or copy operation that is subject to a no-op (no-operation) interface conversion. Furthermore, the source and destination memory addresses involved in the move or copy must overlap and an attacker must be able to supply an input that triggers this specific operation. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "RHBZ#2456340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27144"
},
{
"category": "external",
"summary": "https://go.dev/cl/763764",
"url": "https://go.dev/cl/763764"
},
{
"category": "external",
"summary": "https://go.dev/issue/78371",
"url": "https://go.dev/issue/78371"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4867",
"url": "https://pkg.go.dev/vuln/GO-2026-4867"
}
],
"release_date": "2026-04-08T01:06:56.908000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-27T02:21:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10704"
},
{
"category": "workaround",
"details": "To mitigate this issue, review code that performs memory copies or struct assignments. If data is being passed through an interface (such as \u0027any\u0027 or \u0027interface{}\u0027) just before a move operation, refactor the code to use concrete types or explicit pointers instead.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: cmd/compile: no-op interface conversion bypasses overlap checking"
},
{
"cve": "CVE-2026-32280",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-04-08T02:01:19.572351+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456339"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "RHBZ#2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://go.dev/cl/758320",
"url": "https://go.dev/cl/758320"
},
{
"category": "external",
"summary": "https://go.dev/issue/78282",
"url": "https://go.dev/issue/78282"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4947",
"url": "https://pkg.go.dev/vuln/GO-2026-4947"
}
],
"release_date": "2026-04-08T01:06:58.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-27T02:21:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building"
},
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-27T02:21:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10704"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-32283",
"cwe": {
"id": "CWE-764",
"name": "Multiple Locks of a Critical Resource"
},
"discovery_date": "2026-04-08T02:01:16.213799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "RHBZ#2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"category": "external",
"summary": "https://go.dev/cl/763767",
"url": "https://go.dev/cl/763767"
},
{
"category": "external",
"summary": "https://go.dev/issue/78334",
"url": "https://go.dev/issue/78334"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4870",
"url": "https://pkg.go.dev/vuln/GO-2026-4870"
}
],
"release_date": "2026-04-08T01:06:57.670000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-27T02:21:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.9-1.module+el8.10.0+24226+c418b32c.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.9-1.module+el8.10.0+24226+c418b32c.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages"
}
]
}
RHSA-2026:11507
Vulnerability from csaf_redhat - Published: 2026-04-29 07:37 - Updated: 2026-05-06 09:05A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.
A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282)\n\n* crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283)\n\n* crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building (CVE-2026-32280)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11507",
"url": "https://access.redhat.com/errata/RHSA-2026:11507"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11507.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-05-06T09:05:41+00:00",
"generator": {
"date": "2026-05-06T09:05:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:11507",
"initial_release_date": "2026-04-29T07:37:39+00:00",
"revision_history": [
{
"date": "2026-04-29T07:37:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T07:37:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T09:05:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-30.el8_10.src",
"product": {
"name": "grafana-0:9.2.10-30.el8_10.src",
"product_id": "grafana-0:9.2.10-30.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-30.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-30.el8_10.aarch64",
"product": {
"name": "grafana-0:9.2.10-30.el8_10.aarch64",
"product_id": "grafana-0:9.2.10-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"product": {
"name": "grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"product_id": "grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"product": {
"name": "grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"product_id": "grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-30.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"product": {
"name": "grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"product_id": "grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-30.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-30.el8_10.ppc64le",
"product": {
"name": "grafana-0:9.2.10-30.el8_10.ppc64le",
"product_id": "grafana-0:9.2.10-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"product": {
"name": "grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"product_id": "grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"product": {
"name": "grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"product_id": "grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-30.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"product": {
"name": "grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"product_id": "grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-30.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-30.el8_10.x86_64",
"product": {
"name": "grafana-0:9.2.10-30.el8_10.x86_64",
"product_id": "grafana-0:9.2.10-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-30.el8_10.x86_64",
"product": {
"name": "grafana-selinux-0:9.2.10-30.el8_10.x86_64",
"product_id": "grafana-selinux-0:9.2.10-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"product": {
"name": "grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"product_id": "grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-30.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"product": {
"name": "grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"product_id": "grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-30.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-30.el8_10.s390x",
"product": {
"name": "grafana-0:9.2.10-30.el8_10.s390x",
"product_id": "grafana-0:9.2.10-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-30.el8_10.s390x",
"product": {
"name": "grafana-selinux-0:9.2.10-30.el8_10.s390x",
"product_id": "grafana-selinux-0:9.2.10-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"product": {
"name": "grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"product_id": "grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-30.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"product": {
"name": "grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"product_id": "grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-30.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.aarch64"
},
"product_reference": "grafana-0:9.2.10-30.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.ppc64le"
},
"product_reference": "grafana-0:9.2.10-30.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-30.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.s390x"
},
"product_reference": "grafana-0:9.2.10-30.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-30.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.src"
},
"product_reference": "grafana-0:9.2.10-30.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.x86_64"
},
"product_reference": "grafana-0:9.2.10-30.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.aarch64"
},
"product_reference": "grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le"
},
"product_reference": "grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-30.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.s390x"
},
"product_reference": "grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.x86_64"
},
"product_reference": "grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.aarch64"
},
"product_reference": "grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.ppc64le"
},
"product_reference": "grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-30.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.s390x"
},
"product_reference": "grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.x86_64"
},
"product_reference": "grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.aarch64"
},
"product_reference": "grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.ppc64le"
},
"product_reference": "grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-30.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.s390x"
},
"product_reference": "grafana-selinux-0:9.2.10-30.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.x86_64"
},
"product_reference": "grafana-selinux-0:9.2.10-30.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-32280",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-04-08T02:01:19.572351+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456339"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "RHBZ#2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://go.dev/cl/758320",
"url": "https://go.dev/cl/758320"
},
{
"category": "external",
"summary": "https://go.dev/issue/78282",
"url": "https://go.dev/issue/78282"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4947",
"url": "https://pkg.go.dev/vuln/GO-2026-4947"
}
],
"release_date": "2026-04-08T01:06:58.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T07:37:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11507"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building"
},
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T07:37:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11507"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-32283",
"cwe": {
"id": "CWE-764",
"name": "Multiple Locks of a Critical Resource"
},
"discovery_date": "2026-04-08T02:01:16.213799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "RHBZ#2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"category": "external",
"summary": "https://go.dev/cl/763767",
"url": "https://go.dev/cl/763767"
},
{
"category": "external",
"summary": "https://go.dev/issue/78334",
"url": "https://go.dev/issue/78334"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4870",
"url": "https://pkg.go.dev/vuln/GO-2026-4870"
}
],
"release_date": "2026-04-08T01:06:57.670000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T07:37:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11507"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-30.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-30.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages"
}
]
}
RHSA-2026:11408
Vulnerability from csaf_redhat - Published: 2026-04-28 19:03 - Updated: 2026-05-06 12:40A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.
A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.
A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.
A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "VolSync v0.14 General Availability release images, which provide enhancements, security fixes, and updated container images.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "VolSync v0.14 is a Kubernetes operator that enables asynchronous\nreplication of persistent volumes within a cluster, or across clusters. After\ndeploying the VolSync operator, it can create and maintain copies of your\npersistent data.\n\nFor more information about VolSync, see:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/html/business_continuity/business-cont-overview#volsync\n\nor the VolSync open source community website at: https://volsync.readthedocs.io/en/stable/.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11408",
"url": "https://access.redhat.com/errata/RHSA-2026:11408"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61728",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32282",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11408.json"
}
],
"title": "Red Hat Security Advisory: VolSync v0.14 security fixes and container updates",
"tracking": {
"current_release_date": "2026-05-06T12:40:26+00:00",
"generator": {
"date": "2026-05-06T12:40:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:11408",
"initial_release_date": "2026-04-28T19:03:51+00:00",
"revision_history": [
{
"date": "2026-04-28T19:03:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-28T19:03:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T12:40:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product": {
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:acm:2.15::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Advanced Cluster Management for Kubernetes"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"product_id": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/volsync-rhel9@sha256%3Adcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1777380373"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"product_id": "registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/volsync-operator-bundle@sha256%3A3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1777382747"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"product": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"product_id": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/volsync-rhel9@sha256%3A15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1777380373"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"product": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"product_id": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"product_identification_helper": {
"purl": "pkg:oci/volsync-rhel9@sha256%3Ab92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1777380373"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64",
"product": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64",
"product_id": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/volsync-rhel9@sha256%3Ae251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1777380373"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le"
},
"product_reference": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x"
},
"product_reference": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.15",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
},
"product_reference": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T19:03:51+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/html/business_continuity/business-cont-overview#volsync",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11408"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T19:03:51+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/html/business_continuity/business-cont-overview#volsync",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11408"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T19:03:51+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/html/business_continuity/business-cont-overview#volsync",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11408"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T19:03:51+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/html/business_continuity/business-cont-overview#volsync",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11408"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T19:03:51+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.15/html/business_continuity/business-cont-overview#volsync",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11408"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:3053d9922016840bb6e2a14c783b61cd1799e345139b4a799b35c444e4b19ebd_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:15a198e39cc0d139796a6cc9fa3bc0e6607776b0020f044452265e0868e44598_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:b92dc6fa8b2f0bb35daaa710056cf9c001728ad004679a4987e634899c631d65_s390x",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:dcd8cd73020fa1704bf7f5e21db0c15fb6696a555e57c5dd5d7f6fe5c97f6eba_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.15:registry.redhat.io/rhacm2/volsync-rhel9@sha256:e251496656ed10eafdf45be0a0273d849e7df585e83b52624326df77edfa3a5a_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
}
]
}
RHSA-2026:9385
Vulnerability from csaf_redhat - Published: 2026-04-21 15:08 - Updated: 2026-05-06 12:41A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.
A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.
A flaw was found in lodash. The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().
A flaw was found in path-to-regexp. A remote attacker could exploit this vulnerability by providing specially crafted input that generates a regular expression with multiple sequential optional groups. This leads to an exponential growth in the generated regular expression, causing a Denial of Service (DoS) due to excessive resource consumption.
The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.
A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in github.com/buger/jsonparser. The Delete function, when processing malformed JSON input, fails to properly validate offsets. This vulnerability can lead to a negative slice index and a runtime panic, allowing a remote attacker to cause a denial of service (DoS) by providing specially crafted JSON data.
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.
A flaw was found in Go JOSE, a library for handling JSON Web Encryption (JWE) objects. A remote attacker could exploit this vulnerability by providing a specially crafted JWE object. When decrypting such an object, if a key wrapping algorithm is specified but the encrypted key field is empty, the application can crash. This leads to a denial of service (DoS), making the affected service unavailable to legitimate users.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift distributed tracing platform (Tempo) 3.9.2 has been released",
"title": "Topic"
},
{
"category": "general",
"text": "This release of the Red Hat OpenShift distributed tracing platform (Tempo) provides security improvements and bug fixes.\n\n\nBreaking changes:\n\n* None.\n\n\nDeprecations:\n\n* None.\n\n\nTechnology Preview features:\n\n* None.\n\n\nEnhancements:\n\n* None.\n\n\nBug fixes:\n\n* gRPC-Go authorization bypass vulnerability fix: Previously, gRPC-Go was vulnerable to an authorization bypass attack. This issue occurred because the HTTP/2 :path pseudo-header was not properly validated. Remote attackers could send raw HTTP/2 frames with a malformed :path that omitted the mandatory leading slash to bypass defined security policies. With this update, gRPC-Go properly validates the :path pseudo-header and rejects malformed requests. As a result, attackers can no longer bypass security policies to gain unauthorized access to services or disclose information. For more information, see https://access.redhat.com/security/cve/cve-2026-33186.\n\n* XPath component fix: Previously, the github.com/antchfx/xpath component did not properly handle certain Boolean XPath expressions. A remote attacker could submit a crafted expression that caused an infinite loop, resulting in 100% CPU utilization and a denial-of-service condition. With this update, the XPath component correctly processes Boolean expressions that evaluate to true. The system no longer enters an infinite loop when handling these expressions. For more information, see https://access.redhat.com/security/cve/cve-2026-4645.\n\n* Go JOSE denial-of-service vulnerability fix: Previously, the Go JOSE library for handling JSON Web Encryption (JWE) objects was vulnerable to a denial-of-service (DoS) attack. This issue occurred because the application failed when decrypting a specially crafted JWE object that specified a key wrapping algorithm but contained an empty encrypted key field. With this update, Go JOSE properly validates the encrypted key field before decryption. As a result, the application no longer crashes when processing malformed JWE objects, and the service remains available to legitimate users. For more information, see https://access.redhat.com/security/cve/cve-2026-34986.\n\n* Lodash _.template function fix: Previously, the lodash _.template function validated the variable option but did not validate options.imports key names. Both options passed values to the same code execution path. An attacker with the ability to control options.imports key names or pollute Object.prototype could exploit this gap to execute arbitrary code. With this update, lodash validates options.imports key names by using the same rules applied to the variable option. The _.template function rejects invalid key names and prevents code injection through this path. For more information, see https://access.redhat.com/security/cve/cve-2026-4800.\n\n* Go crypto/x509 and crypto/tls packages fix: Previously, the Go standard library crypto/x509 and crypto/tls packages did not limit the number of intermediate certificates processed during certificate chain building. An attacker could provide an excessive number of intermediate certificates, causing the system to perform an uncontrolled amount of work and resulting in a denial-of-service condition. With this update, the packages limit the number of intermediate certificates accepted during certificate chain validation. The system rejects certificate chains that exceed this limit. For more information, see https://access.redhat.com/security/cve/cve-2026-32280.\n\n* Go Root.Chmod function fix: Previously, the Root.Chmod function in the Go standard library internal/syscall/unix package had a race condition between checking and modifying a target file. An attacker could replace the target with a symbolic link after the check but before the operation completed, causing the permission change to apply to the linked file instead. This allowed an attacker to bypass directory restrictions and change permissions on unintended files. With this update, the Root.Chmod function prevents this race condition. The function no longer follows symbolic links that replace the target during execution. For more information, see https://access.redhat.com/security/cve/cve-2026-32282.\n\n* Go crypto/x509 package fix: Previously, the Go crypto/x509 package applied excluded DNS constraints to wildcard Subject Alternative Names (SANs) in a case-sensitive manner. An attacker could bypass certificate validation by using a different case in the wildcard SAN than the excluded DNS constraint specified. This allowed the system to accept a malicious certificate that should have been rejected. With this update, the package applies DNS constraints case-insensitively when validating wildcard SANs. Certificate chain verification correctly rejects certificates that match excluded DNS constraints regardless of case. For more information, see https://access.redhat.com/security/cve/cve-2026-33810.\n\n* Go crypto/tls component fix: Previously, the Go crypto/tls component did not re-validate certificates against updated certificate authority (CA) settings during TLS session resumption. If CA settings changed between the initial handshake and a resumed session, the component used the original CA settings. An attacker could exploit this to bypass certificate validation and establish a connection that should have been rejected. With this update, the component validates certificates against the current CA settings during session resumption. Resumed sessions that no longer meet CA requirements are rejected. For more information, see https://access.redhat.com/security/cve/cve-2025-68121.\n\n* jsonparser Delete function fix: Previously, the Delete function in the github.com/buger/jsonparser component did not validate offsets when processing malformed JSON input. A remote attacker could provide crafted JSON data that caused a runtime panic, resulting in a denial-of-service condition. With this update, the Delete function validates offsets before processing. The function handles malformed JSON input as expected. For more information, see https://access.redhat.com/security/cve/cve-2026-32285.\n\n* path-to-regexp component fix: Previously, the path-to-regexp component did not limit the complexity of generated regular expressions. A remote attacker could provide input containing multiple sequential optional groups, causing exponential growth in the generated expression and excessive resource consumption. This resulted in a denial-of-service condition. With this update, the component limits regular expression complexity. Input patterns with sequential optional groups no longer cause excessive resource consumption. For more information, see https://access.redhat.com/security/cve/cve-2026-4926.\n\n* Go net/url.Parse function fix: Previously, the Go net/url.Parse function did not properly validate the host component of URLs containing IP-literals. The function ignored invalid characters preceding IP-literals and accepted URLs that should have been rejected. With this update, the function validates the entire host component. URLs with invalid characters before IP-literals are rejected as malformed. For more information, see https://access.redhat.com/security/cve/cve-2026-25679.\n\n* Go crypto/x509 module fix: Previously, the Go crypto/x509 module did not apply all email address constraints when validating certificates. If a certificate contained multiple email constraints with the same local portion but different domain portions, the module only enforced the last constraint and ignored the others. With this update, the module applies all email address constraints during certificate chain validation. Certificates are validated against every specified email constraint. For more information, see https://access.redhat.com/security/cve/cve-2026-27137.\n\n\nKnown issues:\n\n* Gateway fails to forward OTLP HTTP traffic when receiver TLS is enabled. When Tempo Monolithic is configured with `multitenancy.enabled: true` and `ingestion.otlp.http.tls.enabled: true`, the gateway forwards OTLP HTTP traffic to the Tempo receiver using plain HTTP instead of HTTPS. As a consequence, the connection fails with a `connection reset by peer` error because the receiver expects TLS connections. OTLP gRPC ingestion through the gateway is not affected. Jira issue: https://issues.redhat.com/browse/TRACING-5973.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:9385",
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32280",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32282",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32285",
"url": "https://access.redhat.com/security/cve/CVE-2026-32285"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33810",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-34986",
"url": "https://access.redhat.com/security/cve/CVE-2026-34986"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4645",
"url": "https://access.redhat.com/security/cve/CVE-2026-4645"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4800",
"url": "https://access.redhat.com/security/cve/CVE-2026-4800"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4926",
"url": "https://access.redhat.com/security/cve/CVE-2026-4926"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_9385.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.2 release",
"tracking": {
"current_release_date": "2026-05-06T12:41:31+00:00",
"generator": {
"date": "2026-05-06T12:41:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:9385",
"initial_release_date": "2026-04-21T15:08:38+00:00",
"revision_history": [
{
"date": "2026-04-21T15:08:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-21T15:08:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T12:41:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.9.2",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.9::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256%3Ad180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776674955"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435643"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435608"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3A034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435631"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3Aa5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435565"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435613"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435680"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3Ac939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435643"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435608"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Aa66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435631"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3A0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435565"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435613"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435680"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435643"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435608"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3A9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435631"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3A1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435565"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435613"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435680"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435643"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435608"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Ab68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435631"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3Ac7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435565"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3Aee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435613"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1776435680"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.2",
"product_id": "Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/tls component. This vulnerability occurs during Transport Layer Security (TLS) session resumption when certificate authority (CA) settings are modified between the initial and resumed handshakes. An attacker could exploit this to bypass certificate validation, allowing a client or server to establish a connection that should have been rejected. This could lead to an authentication bypass under specific conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a moderate flaw because it only occurs under specific conditions, such as TLS session resumption with runtime changes to certificate authority settings. Exploitation is not straightforward and requires a controlled setup. The impact is limited to certificate validation within the same component and does not affect system availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption"
},
{
"cve": "CVE-2026-4645",
"discovery_date": "2026-03-23T06:02:52.120840+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` function, leading to 100% CPU utilization and a Denial of Service (DoS) condition for the affected system.",
"title": "Vulnerability description"
},
{
"category": "other",
"text": "A denial of service vulnerability was discovered in `github.com/antchfx/xpath`, with Important severity. Systems processing untrusted XPath expressions are vulnerable to an infinite loop, leading to 100% CPU utilization which would impact normal operations of the system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4645"
}
],
"release_date": "2026-03-17T20:58:59+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict the processing of untrusted or unvalidated XPath expressions by applications which utilize the `github.com/antchfx/xpath` component. Implement input validation and sanitization for all XPath expressions originating from external or untrusted sources. If possible, configure applications to only process XPath expressions from trusted sources or disable features that allow arbitrary XPath expression evaluation.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/antchfx/xpath: xpath: Denial of Service via crafted Boolean XPath expressions"
},
{
"cve": "CVE-2026-4800",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2026-03-31T20:01:21.918257+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453496"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in lodash. The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: lodash: Arbitrary code execution via untrusted input in template imports",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the context of Red Hat Enterprise Linux, the grafana and grafana-pcp packages execute the affected JavaScript entirely client-side within the user\u0027s browser. Consequently, the attack surface is strictly restricted to the local browser environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4800"
},
{
"category": "external",
"summary": "RHBZ#2453496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4800",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4800"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
"url": "https://github.com/advisories/GHSA-35jh-r3h4-6jhm"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
"url": "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c"
}
],
"release_date": "2026-03-31T19:25:55.987000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: lodash: Arbitrary code execution via untrusted input in template imports"
},
{
"cve": "CVE-2026-4926",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-03-26T20:03:28.427630+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in path-to-regexp. A remote attacker could exploit this vulnerability by providing specially crafted input that generates a regular expression with multiple sequential optional groups. This leads to an exponential growth in the generated regular expression, causing a Denial of Service (DoS) due to excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "path-to-regexp: path-to-regexp: Denial of Service via crafted regular expressions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important flaw in `path-to-regexp` that can lead to a Denial of Service. The vulnerability occurs when specially crafted input containing multiple sequential optional groups is used to generate regular expressions, causing exponential resource consumption.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4926"
},
{
"category": "external",
"summary": "RHBZ#2451867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4926",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4926"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
}
],
"release_date": "2026-03-26T18:59:38+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, limit the use of multiple sequential optional groups in route patterns within applications that use `path-to-regexp`. Additionally, avoid directly passing user-controlled input as route patterns to prevent the generation of maliciously crafted regular expressions.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "path-to-regexp: path-to-regexp: Denial of Service via crafted regular expressions"
},
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
},
{
"cve": "CVE-2026-32280",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-04-08T02:01:19.572351+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456339"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "RHBZ#2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://go.dev/cl/758320",
"url": "https://go.dev/cl/758320"
},
{
"category": "external",
"summary": "https://go.dev/issue/78282",
"url": "https://go.dev/issue/78282"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4947",
"url": "https://pkg.go.dev/vuln/GO-2026-4947"
}
],
"release_date": "2026-04-08T01:06:58.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building"
},
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-32285",
"cwe": {
"id": "CWE-1285",
"name": "Improper Validation of Specified Index, Position, or Offset in Input"
},
"discovery_date": "2026-03-26T20:01:54.925687+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in github.com/buger/jsonparser. The Delete function, when processing malformed JSON input, fails to properly validate offsets. This vulnerability can lead to a negative slice index and a runtime panic, allowing a remote attacker to cause a denial of service (DoS) by providing specially crafted JSON data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/buger/jsonparser: github.com/buger/jsonparser: Denial of Service via malformed JSON input",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32285"
},
{
"category": "external",
"summary": "RHBZ#2451846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32285",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32285"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32285",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32285"
},
{
"category": "external",
"summary": "https://github.com/buger/jsonparser/issues/275",
"url": "https://github.com/buger/jsonparser/issues/275"
},
{
"category": "external",
"summary": "https://github.com/golang/vulndb/issues/4514",
"url": "https://github.com/golang/vulndb/issues/4514"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4514",
"url": "https://pkg.go.dev/vuln/GO-2026-4514"
}
],
"release_date": "2026-03-26T19:40:51.837000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/buger/jsonparser: github.com/buger/jsonparser: Denial of Service via malformed JSON input"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
},
{
"cve": "CVE-2026-33810",
"cwe": {
"id": "CWE-1289",
"name": "Improper Validation of Unsafe Equivalence in Input"
},
"discovery_date": "2026-04-08T02:01:09.100830+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456335"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/x509` package within Go (golang). When verifying a certificate chain, excluded DNS (Domain Name System) constraints are not correctly applied to wildcard DNS Subject Alternative Names (SANs) if the case of the SAN differs from the constraint. This oversight could allow an attacker to bypass certificate validation, potentially leading to the acceptance of a malicious certificate that should have been rejected. This issue specifically impacts the validation of trusted certificate chains.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "RHBZ#2456335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456335"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33810",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"category": "external",
"summary": "https://go.dev/cl/763763",
"url": "https://go.dev/cl/763763"
},
{
"category": "external",
"summary": "https://go.dev/issue/78332",
"url": "https://go.dev/issue/78332"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4866",
"url": "https://pkg.go.dev/vuln/GO-2026-4866"
}
],
"release_date": "2026-04-08T01:06:56.546000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Go crypto/x509: Certificate validation bypass due to incorrect DNS constraint application"
},
{
"cve": "CVE-2026-34986",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-06T17:01:34.639203+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2455470"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go JOSE, a library for handling JSON Web Encryption (JWE) objects. A remote attacker could exploit this vulnerability by providing a specially crafted JWE object. When decrypting such an object, if a key wrapping algorithm is specified but the encrypted key field is empty, the application can crash. This leads to a denial of service (DoS), making the affected service unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34986"
},
{
"category": "external",
"summary": "RHBZ#2455470",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455470"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34986",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34986"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"category": "external",
"summary": "https://github.com/go-jose/go-jose/security/advisories/GHSA-78h2-9frx-2jm8",
"url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-78h2-9frx-2jm8"
},
{
"category": "external",
"summary": "https://pkg.go.dev/github.com/go-jose/go-jose/v4#pkg-constants",
"url": "https://pkg.go.dev/github.com/go-jose/go-jose/v4#pkg-constants"
}
],
"release_date": "2026-04-06T16:22:45.353000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-21T15:08:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:9385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:034af4f19268a6ae63aa7f49ca70f0d1c0311fd269a3bdd79f337260c89ac052_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:9012c42fbb769f3e186bb9ade5f5a044a38e0db7336648050def9fb2f0057c9e_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a66154755c86d821035cf83c940401ddc2a8d45b395f3a36d58f5755de621e43_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:b68e6b2f84171b46ba16b1a2e1d4e4624faacc09453cf14ca68e319e9c8b7115_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:59b7e5bd9dfbf299d3fb92747eccc89a0ac546939f0496deb0cbd418b016be30_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:61eacd3b26e3d12166e61a3cabe2137fb074f245ded11e1f745bb74839f077d4_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:9f8e4d6c9e6784baf45513552e8be6487d30d93679043519958b6cc47255b613_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:c939c718084a9f1cff2bb56f932398c58ee3968834ff31ce85c4d356423b6545_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:0205c0565948891a128ed9b6d639582b20cc50123ad22a8cbbf414d4843f2fe8_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:15db63cb743ea84e1acc3d668543233b4bd566c73dc0f033ae8b43390f324764_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:63a9b773e467978769c428a538c8d75c28bfe52e069ac17d269fb7b3c5ad7f54_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:81a49b0518d578de0f8fafdb50cc844e1f6dbf1241d7a10856b8ae810fd873af_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:d180bac53d873bba131cedd40db06cd784d8dc4795d9bff85a6b33921cc1dd9c_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:1c4fa975d38a317a307967887524df0c7c3117a91452730978de55a70b41153b_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:3afa5f0d4f74e4d74a74ae9f2ed1c9cdd817473f3ae074de269af9625b77643d_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:820a6bdb3262f1350e06af22121ba6d454908ac6747fa64d768226e6ff77d982_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:ee7da439cd21c32b1bc419de7e6d00b13d755a7b360dfea2ff882f9b1a25aa9d_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0a70a38b8b349197a0bd807e226803976c23fda03683f3d63b0687b9bd45d540_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:1dec0c1cd978d3f260d99133ac942a88e255708197f5ded6594db00082357d33_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a5befd5575eebc08f0c6ec8b928f8b5c286ebb3d2dfcdbcb0cdd696b54335299_amd64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:c7ae36b9d4c9bfb0750bdb7e9d7b897940ab5149eb670b44c1fe9b1ca7688910_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:0925a2af960b4714614d3f73a14b7a2a04de655cfcedbdd843c06ea5872d1987_s390x",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:53621f808c45a6c8aec0d2df240106a41b1f48c59bb3db648d3d20bb03cb92cf_arm64",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:55635b179e701a58643a4ffc148d75ed2d1e82a383783812484e3da9b7bedaf4_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.2:registry.redhat.io/rhosdt/tempo-rhel9@sha256:9a0a8a33df8e58e391d28fae62e06378c4f3c26e4d81532d38728632698f637c_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object"
}
]
}
RHSA-2026:11514
Vulnerability from csaf_redhat - Published: 2026-04-29 08:11 - Updated: 2026-05-06 09:05A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.
A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana-pcp is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.\n\nSecurity Fix(es):\n\n* golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282)\n\n* crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283)\n\n* crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building (CVE-2026-32280)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11514",
"url": "https://access.redhat.com/errata/RHSA-2026:11514"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11514.json"
}
],
"title": "Red Hat Security Advisory: grafana-pcp security update",
"tracking": {
"current_release_date": "2026-05-06T09:05:41+00:00",
"generator": {
"date": "2026-05-06T09:05:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:11514",
"initial_release_date": "2026-04-29T08:11:59+00:00",
"revision_history": [
{
"date": "2026-04-29T08:11:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T08:11:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T09:05:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-14.el8_10.src",
"product": {
"name": "grafana-pcp-0:5.1.1-14.el8_10.src",
"product_id": "grafana-pcp-0:5.1.1-14.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-14.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"product": {
"name": "grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"product_id": "grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-14.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-14.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-14.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"product_id": "grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-14.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"product_id": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-14.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-14.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"product": {
"name": "grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"product_id": "grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-14.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-14.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-14.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-14.el8_10.s390x",
"product": {
"name": "grafana-pcp-0:5.1.1-14.el8_10.s390x",
"product_id": "grafana-pcp-0:5.1.1-14.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-14.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"product_id": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-14.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-14.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-14.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.aarch64"
},
"product_reference": "grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-14.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-14.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.s390x"
},
"product_reference": "grafana-pcp-0:5.1.1-14.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-14.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.src"
},
"product_reference": "grafana-pcp-0:5.1.1-14.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-14.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.x86_64"
},
"product_reference": "grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-32280",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-04-08T02:01:19.572351+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456339"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "RHBZ#2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://go.dev/cl/758320",
"url": "https://go.dev/cl/758320"
},
{
"category": "external",
"summary": "https://go.dev/issue/78282",
"url": "https://go.dev/issue/78282"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4947",
"url": "https://pkg.go.dev/vuln/GO-2026-4947"
}
],
"release_date": "2026-04-08T01:06:58.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T08:11:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building"
},
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T08:11:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11514"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-32283",
"cwe": {
"id": "CWE-764",
"name": "Multiple Locks of a Critical Resource"
},
"discovery_date": "2026-04-08T02:01:16.213799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "RHBZ#2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"category": "external",
"summary": "https://go.dev/cl/763767",
"url": "https://go.dev/cl/763767"
},
{
"category": "external",
"summary": "https://go.dev/issue/78334",
"url": "https://go.dev/issue/78334"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4870",
"url": "https://pkg.go.dev/vuln/GO-2026-4870"
}
],
"release_date": "2026-04-08T01:06:57.670000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T08:11:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-14.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-14.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages"
}
]
}
RHSA-2026:11711
Vulnerability from csaf_redhat - Published: 2026-04-29 13:32 - Updated: 2026-05-06 09:05A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282)\n\n* crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11711",
"url": "https://access.redhat.com/errata/RHSA-2026:11711"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11711.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-05-06T09:05:43+00:00",
"generator": {
"date": "2026-05-06T09:05:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:11711",
"initial_release_date": "2026-04-29T13:32:55+00:00",
"revision_history": [
{
"date": "2026-04-29T13:32:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T13:32:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T09:05:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-21.el9_7.src",
"product": {
"name": "grafana-0:10.2.6-21.el9_7.src",
"product_id": "grafana-0:10.2.6-21.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-21.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-21.el9_7.aarch64",
"product": {
"name": "grafana-0:10.2.6-21.el9_7.aarch64",
"product_id": "grafana-0:10.2.6-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-21.el9_7.aarch64",
"product": {
"name": "grafana-selinux-0:10.2.6-21.el9_7.aarch64",
"product_id": "grafana-selinux-0:10.2.6-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-21.el9_7.aarch64",
"product": {
"name": "grafana-debugsource-0:10.2.6-21.el9_7.aarch64",
"product_id": "grafana-debugsource-0:10.2.6-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-21.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-21.el9_7.aarch64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-21.el9_7.aarch64",
"product_id": "grafana-debuginfo-0:10.2.6-21.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-21.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-21.el9_7.ppc64le",
"product": {
"name": "grafana-0:10.2.6-21.el9_7.ppc64le",
"product_id": "grafana-0:10.2.6-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-21.el9_7.ppc64le",
"product": {
"name": "grafana-selinux-0:10.2.6-21.el9_7.ppc64le",
"product_id": "grafana-selinux-0:10.2.6-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-21.el9_7.ppc64le",
"product": {
"name": "grafana-debugsource-0:10.2.6-21.el9_7.ppc64le",
"product_id": "grafana-debugsource-0:10.2.6-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-21.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le",
"product": {
"name": "grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le",
"product_id": "grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-21.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-21.el9_7.x86_64",
"product": {
"name": "grafana-0:10.2.6-21.el9_7.x86_64",
"product_id": "grafana-0:10.2.6-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-21.el9_7.x86_64",
"product": {
"name": "grafana-selinux-0:10.2.6-21.el9_7.x86_64",
"product_id": "grafana-selinux-0:10.2.6-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-21.el9_7.x86_64",
"product": {
"name": "grafana-debugsource-0:10.2.6-21.el9_7.x86_64",
"product_id": "grafana-debugsource-0:10.2.6-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-21.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-21.el9_7.x86_64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-21.el9_7.x86_64",
"product_id": "grafana-debuginfo-0:10.2.6-21.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-21.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-21.el9_7.s390x",
"product": {
"name": "grafana-0:10.2.6-21.el9_7.s390x",
"product_id": "grafana-0:10.2.6-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-21.el9_7.s390x",
"product": {
"name": "grafana-selinux-0:10.2.6-21.el9_7.s390x",
"product_id": "grafana-selinux-0:10.2.6-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-21.el9_7.s390x",
"product": {
"name": "grafana-debugsource-0:10.2.6-21.el9_7.s390x",
"product_id": "grafana-debugsource-0:10.2.6-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-21.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-21.el9_7.s390x",
"product": {
"name": "grafana-debuginfo-0:10.2.6-21.el9_7.s390x",
"product_id": "grafana-debuginfo-0:10.2.6-21.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-21.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.aarch64"
},
"product_reference": "grafana-0:10.2.6-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.ppc64le"
},
"product_reference": "grafana-0:10.2.6-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.s390x"
},
"product_reference": "grafana-0:10.2.6-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-21.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.src"
},
"product_reference": "grafana-0:10.2.6-21.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.x86_64"
},
"product_reference": "grafana-0:10.2.6-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.aarch64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le"
},
"product_reference": "grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.s390x"
},
"product_reference": "grafana-debuginfo-0:10.2.6-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.x86_64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.aarch64"
},
"product_reference": "grafana-debugsource-0:10.2.6-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.ppc64le"
},
"product_reference": "grafana-debugsource-0:10.2.6-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.s390x"
},
"product_reference": "grafana-debugsource-0:10.2.6-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.x86_64"
},
"product_reference": "grafana-debugsource-0:10.2.6-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-21.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.aarch64"
},
"product_reference": "grafana-selinux-0:10.2.6-21.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-21.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.ppc64le"
},
"product_reference": "grafana-selinux-0:10.2.6-21.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-21.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.s390x"
},
"product_reference": "grafana-selinux-0:10.2.6-21.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-21.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.x86_64"
},
"product_reference": "grafana-selinux-0:10.2.6-21.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T13:32:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11711"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-32283",
"cwe": {
"id": "CWE-764",
"name": "Multiple Locks of a Critical Resource"
},
"discovery_date": "2026-04-08T02:01:16.213799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "RHBZ#2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"category": "external",
"summary": "https://go.dev/cl/763767",
"url": "https://go.dev/cl/763767"
},
{
"category": "external",
"summary": "https://go.dev/issue/78334",
"url": "https://go.dev/issue/78334"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4870",
"url": "https://pkg.go.dev/vuln/GO-2026-4870"
}
],
"release_date": "2026-04-08T01:06:57.670000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T13:32:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11711"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-21.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-21.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages"
}
]
}
RHSA-2026:11712
Vulnerability from csaf_redhat - Published: 2026-04-29 13:13 - Updated: 2026-05-06 09:05A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282)\n\n* crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11712",
"url": "https://access.redhat.com/errata/RHSA-2026:11712"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11712.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-05-06T09:05:43+00:00",
"generator": {
"date": "2026-05-06T09:05:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:11712",
"initial_release_date": "2026-04-29T13:13:50+00:00",
"revision_history": [
{
"date": "2026-04-29T13:13:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T13:13:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T09:05:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-25.el10_1.src",
"product": {
"name": "grafana-0:10.2.6-25.el10_1.src",
"product_id": "grafana-0:10.2.6-25.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-25.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-25.el10_1.aarch64",
"product": {
"name": "grafana-0:10.2.6-25.el10_1.aarch64",
"product_id": "grafana-0:10.2.6-25.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-25.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-25.el10_1.aarch64",
"product": {
"name": "grafana-selinux-0:10.2.6-25.el10_1.aarch64",
"product_id": "grafana-selinux-0:10.2.6-25.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-25.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-25.el10_1.aarch64",
"product": {
"name": "grafana-debugsource-0:10.2.6-25.el10_1.aarch64",
"product_id": "grafana-debugsource-0:10.2.6-25.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-25.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-25.el10_1.aarch64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-25.el10_1.aarch64",
"product_id": "grafana-debuginfo-0:10.2.6-25.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-25.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-25.el10_1.ppc64le",
"product": {
"name": "grafana-0:10.2.6-25.el10_1.ppc64le",
"product_id": "grafana-0:10.2.6-25.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-25.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-25.el10_1.ppc64le",
"product": {
"name": "grafana-selinux-0:10.2.6-25.el10_1.ppc64le",
"product_id": "grafana-selinux-0:10.2.6-25.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-25.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-25.el10_1.ppc64le",
"product": {
"name": "grafana-debugsource-0:10.2.6-25.el10_1.ppc64le",
"product_id": "grafana-debugsource-0:10.2.6-25.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-25.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le",
"product": {
"name": "grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le",
"product_id": "grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-25.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-25.el10_1.s390x",
"product": {
"name": "grafana-0:10.2.6-25.el10_1.s390x",
"product_id": "grafana-0:10.2.6-25.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-25.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-25.el10_1.s390x",
"product": {
"name": "grafana-selinux-0:10.2.6-25.el10_1.s390x",
"product_id": "grafana-selinux-0:10.2.6-25.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-25.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-25.el10_1.s390x",
"product": {
"name": "grafana-debugsource-0:10.2.6-25.el10_1.s390x",
"product_id": "grafana-debugsource-0:10.2.6-25.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-25.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-25.el10_1.s390x",
"product": {
"name": "grafana-debuginfo-0:10.2.6-25.el10_1.s390x",
"product_id": "grafana-debuginfo-0:10.2.6-25.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-25.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-25.el10_1.x86_64",
"product": {
"name": "grafana-0:10.2.6-25.el10_1.x86_64",
"product_id": "grafana-0:10.2.6-25.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-25.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-25.el10_1.x86_64",
"product": {
"name": "grafana-selinux-0:10.2.6-25.el10_1.x86_64",
"product_id": "grafana-selinux-0:10.2.6-25.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-25.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-25.el10_1.x86_64",
"product": {
"name": "grafana-debugsource-0:10.2.6-25.el10_1.x86_64",
"product_id": "grafana-debugsource-0:10.2.6-25.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-25.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-25.el10_1.x86_64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-25.el10_1.x86_64",
"product_id": "grafana-debuginfo-0:10.2.6-25.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-25.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-25.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.aarch64"
},
"product_reference": "grafana-0:10.2.6-25.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-25.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.ppc64le"
},
"product_reference": "grafana-0:10.2.6-25.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-25.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.s390x"
},
"product_reference": "grafana-0:10.2.6-25.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-25.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.src"
},
"product_reference": "grafana-0:10.2.6-25.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-25.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.x86_64"
},
"product_reference": "grafana-0:10.2.6-25.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-25.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.aarch64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-25.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le"
},
"product_reference": "grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-25.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.s390x"
},
"product_reference": "grafana-debuginfo-0:10.2.6-25.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-25.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.x86_64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-25.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-25.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.aarch64"
},
"product_reference": "grafana-debugsource-0:10.2.6-25.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-25.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.ppc64le"
},
"product_reference": "grafana-debugsource-0:10.2.6-25.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-25.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.s390x"
},
"product_reference": "grafana-debugsource-0:10.2.6-25.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-25.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.x86_64"
},
"product_reference": "grafana-debugsource-0:10.2.6-25.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-25.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.aarch64"
},
"product_reference": "grafana-selinux-0:10.2.6-25.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-25.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.ppc64le"
},
"product_reference": "grafana-selinux-0:10.2.6-25.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-25.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.s390x"
},
"product_reference": "grafana-selinux-0:10.2.6-25.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-25.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.x86_64"
},
"product_reference": "grafana-selinux-0:10.2.6-25.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T13:13:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11712"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-32283",
"cwe": {
"id": "CWE-764",
"name": "Multiple Locks of a Critical Resource"
},
"discovery_date": "2026-04-08T02:01:16.213799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "RHBZ#2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"category": "external",
"summary": "https://go.dev/cl/763767",
"url": "https://go.dev/cl/763767"
},
{
"category": "external",
"summary": "https://go.dev/issue/78334",
"url": "https://go.dev/issue/78334"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4870",
"url": "https://pkg.go.dev/vuln/GO-2026-4870"
}
],
"release_date": "2026-04-08T01:06:57.670000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T13:13:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11712"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-25.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-25.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages"
}
]
}
RHSA-2026:11704
Vulnerability from csaf_redhat - Published: 2026-04-29 13:09 - Updated: 2026-05-06 09:05A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana-pcp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.\n\nSecurity Fix(es):\n\n* golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282)\n\n* crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11704",
"url": "https://access.redhat.com/errata/RHSA-2026:11704"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11704.json"
}
],
"title": "Red Hat Security Advisory: grafana-pcp security update",
"tracking": {
"current_release_date": "2026-05-06T09:05:42+00:00",
"generator": {
"date": "2026-05-06T09:05:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:11704",
"initial_release_date": "2026-04-29T13:09:25+00:00",
"revision_history": [
{
"date": "2026-04-29T13:09:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T13:09:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T09:05:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-14.el9_7.src",
"product": {
"name": "grafana-pcp-0:5.1.1-14.el9_7.src",
"product_id": "grafana-pcp-0:5.1.1-14.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-14.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-14.el9_7.aarch64",
"product": {
"name": "grafana-pcp-0:5.1.1-14.el9_7.aarch64",
"product_id": "grafana-pcp-0:5.1.1-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-14.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-14.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-14.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-14.el9_7.ppc64le",
"product": {
"name": "grafana-pcp-0:5.1.1-14.el9_7.ppc64le",
"product_id": "grafana-pcp-0:5.1.1-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-14.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le",
"product_id": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-14.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-14.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-14.el9_7.x86_64",
"product": {
"name": "grafana-pcp-0:5.1.1-14.el9_7.x86_64",
"product_id": "grafana-pcp-0:5.1.1-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-14.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-14.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-14.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-14.el9_7.s390x",
"product": {
"name": "grafana-pcp-0:5.1.1-14.el9_7.s390x",
"product_id": "grafana-pcp-0:5.1.1-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-14.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x",
"product_id": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-14.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-14.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.aarch64"
},
"product_reference": "grafana-pcp-0:5.1.1-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.ppc64le"
},
"product_reference": "grafana-pcp-0:5.1.1-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.s390x"
},
"product_reference": "grafana-pcp-0:5.1.1-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-14.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.src"
},
"product_reference": "grafana-pcp-0:5.1.1-14.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.x86_64"
},
"product_reference": "grafana-pcp-0:5.1.1-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T13:09:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11704"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-32283",
"cwe": {
"id": "CWE-764",
"name": "Multiple Locks of a Critical Resource"
},
"discovery_date": "2026-04-08T02:01:16.213799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "RHBZ#2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"category": "external",
"summary": "https://go.dev/cl/763767",
"url": "https://go.dev/cl/763767"
},
{
"category": "external",
"summary": "https://go.dev/issue/78334",
"url": "https://go.dev/issue/78334"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4870",
"url": "https://pkg.go.dev/vuln/GO-2026-4870"
}
],
"release_date": "2026-04-08T01:06:57.670000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T13:09:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-14.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages"
}
]
}
RHSA-2026:11863
Vulnerability from csaf_redhat - Published: 2026-04-29 17:54 - Updated: 2026-05-06 09:05A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rhc-worker-playbook is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "A worker for yggdrasil that receives Ansible playbooks and executes them against the local host.\n\nSecurity Fix(es):\n\n* golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282)\n\n* crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11863",
"url": "https://access.redhat.com/errata/RHSA-2026:11863"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11863.json"
}
],
"title": "Red Hat Security Advisory: rhc-worker-playbook security update",
"tracking": {
"current_release_date": "2026-05-06T09:05:44+00:00",
"generator": {
"date": "2026-05-06T09:05:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:11863",
"initial_release_date": "2026-04-29T17:54:26+00:00",
"revision_history": [
{
"date": "2026-04-29T17:54:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T17:54:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T09:05:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.src",
"product": {
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.src",
"product_id": "rhc-worker-playbook-0:0.2.3-5.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook@0.2.3-5.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64",
"product": {
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64",
"product_id": "rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook@0.2.3-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64",
"product": {
"name": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64",
"product_id": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook-debugsource@0.2.3-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64",
"product": {
"name": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64",
"product_id": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook-debuginfo@0.2.3-5.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le",
"product": {
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le",
"product_id": "rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook@0.2.3-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le",
"product": {
"name": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le",
"product_id": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook-debugsource@0.2.3-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le",
"product": {
"name": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le",
"product_id": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook-debuginfo@0.2.3-5.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.s390x",
"product": {
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.s390x",
"product_id": "rhc-worker-playbook-0:0.2.3-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook@0.2.3-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x",
"product": {
"name": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x",
"product_id": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook-debugsource@0.2.3-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x",
"product": {
"name": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x",
"product_id": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook-debuginfo@0.2.3-5.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64",
"product": {
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64",
"product_id": "rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook@0.2.3-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64",
"product": {
"name": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64",
"product_id": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook-debugsource@0.2.3-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64",
"product": {
"name": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64",
"product_id": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhc-worker-playbook-debuginfo@0.2.3-5.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64"
},
"product_reference": "rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le"
},
"product_reference": "rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.s390x"
},
"product_reference": "rhc-worker-playbook-0:0.2.3-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.src"
},
"product_reference": "rhc-worker-playbook-0:0.2.3-5.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64"
},
"product_reference": "rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64"
},
"product_reference": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le"
},
"product_reference": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x"
},
"product_reference": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64"
},
"product_reference": "rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64"
},
"product_reference": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le"
},
"product_reference": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x"
},
"product_reference": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64"
},
"product_reference": "rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.src",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T17:54:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.src",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11863"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.src",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.src",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-32283",
"cwe": {
"id": "CWE-764",
"name": "Multiple Locks of a Critical Resource"
},
"discovery_date": "2026-04-08T02:01:16.213799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.src",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "RHBZ#2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"category": "external",
"summary": "https://go.dev/cl/763767",
"url": "https://go.dev/cl/763767"
},
{
"category": "external",
"summary": "https://go.dev/issue/78334",
"url": "https://go.dev/issue/78334"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4870",
"url": "https://pkg.go.dev/vuln/GO-2026-4870"
}
],
"release_date": "2026-04-08T01:06:57.670000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T17:54:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.src",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11863"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.src",
"AppStream-10.1.Z:rhc-worker-playbook-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debuginfo-0:0.2.3-5.el10_1.x86_64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.aarch64",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.ppc64le",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.s390x",
"AppStream-10.1.Z:rhc-worker-playbook-debugsource-0:0.2.3-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages"
}
]
}
RHSA-2026:13826
Vulnerability from csaf_redhat - Published: 2026-05-05 16:10 - Updated: 2026-05-06 09:05A flaw was found in Axios, a promise-based HTTP client. This vulnerability occurs because Axios does not correctly handle hostname normalization when evaluating NO_PROXY rules. An attacker can exploit this by crafting requests to loopback addresses (e.g., localhost. or [::1]) which bypass the NO_PROXY configuration and are routed through the configured proxy. This can lead to Server-Side Request Forgery (SSRF) vulnerabilities, enabling attackers to access sensitive internal or loopback services that should otherwise be protected.
A flaw was found in Python-Markdown. Parsing crafted markdown content containing malformed HTML-like sequences causes html.parser.HTMLParser to raise an unhandled AssertionError. This unhandled exception allows an attacker to cause an application crash and potentially disclose sensitive information via its stack trace.
A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., "Content-Length" and "content-length"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.
A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a "decompression bomb," during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.
A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.
A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client's Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.
A security flaw was identified in the Orchestrator Plugin of Red Hat Developer Hub (Backstage). The issue occurs due to insufficient input validation in GraphQL query handling. An authenticated user can inject specially crafted input into API requests, which disrupts backend query processing. This results in the entire Backstage application crashing and restarting, leading to a platform-wide Denial of Service (DoS). As a result, legitimate users temporarily lose access to the platform.
A flaw was found in lodash. The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().
A flaw was found in path-to-regexp. A remote attacker could exploit this vulnerability by providing specially crafted input that generates a regular expression with multiple sequential optional groups. This leads to an exponential growth in the generated regular expression, causing a Denial of Service (DoS) due to excessive resource consumption.
A flaw was found in Underscore.js, a JavaScript utility library. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) attack by providing specially crafted recursive data structures. When these structures are processed by the _.flatten or _.isEqual functions, which lack a depth limit for recursion, a stack overflow occurs. This can make the application unavailable to legitimate users.
A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).
A flaw was found in Immutable.js, a library for persistent immutable data structures. This vulnerability, known as Prototype Pollution, allows an attacker with low privileges to inject unwanted properties into core JavaScript object prototypes without user interaction. By manipulating specific APIs such as mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject(), a remote attacker could potentially execute arbitrary code or cause a denial of service (DoS).
A flaw was found in SVGO, an SVG (Scalable Vector Graphics) Optimizer. This vulnerability allows a remote attacker to cause a Denial of Service (DoS) by submitting a specially crafted XML file. The application's failure to properly guard against XML entity expansion or recursion can lead to the Node.js process consuming excessive memory and crashing.
A flaw was found in Backstage. The backstage/plugin-techdocs-node package uses an allowlist to filter dangerous MkDocs configuration keys during the documentation build process. A gap in this allowlist allows attackers to craft an mkdocs.yml file that causes arbitrary Python code execution.
A denial of service flaw has been discovered in the flatted npm library. flatted's parse() function uses a recursive revive() phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential $ indices, the recursion depth is unbounded, causing a stack overflow that crashes the Node.js process.
A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.
A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in flatted, a JavaScript Object Notation (JSON) parser designed for handling circular data structures. A remote attacker can exploit this vulnerability by providing specially crafted JSON input. The parse() function in flatted fails to properly validate string values used as array index keys, allowing an attacker to manipulate internal JavaScript object prototypes. This prototype pollution can enable an attacker to execute arbitrary code or cause a denial of service, impacting the availability and integrity of affected systems.
A flaw was found in the node-forge library, a JavaScript implementation of Transport Layer Security. This vulnerability, inherited from the bundled jsbn library, allows a remote attacker to cause a Denial of Service (DoS). When the BigInteger.modInverse() function is called with a zero value, it enters an infinite loop, causing the process to hang indefinitely and consume 100% of the CPU resources.
A flaw was found in Forge (also called `node-forge`), a JavaScript implementation of Transport Layer Security. A remote attacker could exploit weaknesses in the RSASSA PKCS#1 v1.5 signature verification process. By crafting malicious signatures that include extra data within the ASN structure and do not meet padding requirements, an attacker can bypass signature validation. This allows for the creation of forged signatures that appear legitimate, potentially compromising the integrity and authenticity of communications.
A flaw was found in Forge (also called `node-forge`), a JavaScript library used for Transport Layer Security (TLS). The library's Ed25519 signature verification process does not correctly validate cryptographic signatures, allowing forged non-canonical signatures to be accepted. A remote attacker could exploit this signature malleability to bypass authentication and authorization logic. This vulnerability can also circumvent security checks in applications that rely on the uniqueness of cryptographic signatures for functions such as deduplication or preventing replay attacks.
A flaw was found in Forge (also known as node-forge), a JavaScript implementation of Transport Layer Security (TLS). The `pki.verifyCertificateChain()` function does not properly enforce certificate validation rules. This oversight allows an intermediate certificate that lacks specific security extensions to enable any leaf certificate to function as a Certificate Authority (CA) and sign other certificates. Consequently, node-forge could accept these unauthorized certificates as valid, potentially leading to spoofing or the issuance of illegitimate certificates.
A flaw was found in basic-ftp, an FTP client for Node.js. A remote attacker can exploit this vulnerability by injecting Carriage Return Line Feed (CRLF) sequences into file path parameters used by high-level APIs. This allows the attacker to split a single intended FTP command into multiple commands. Such command injection can lead to the execution of arbitrary commands, potentially compromising the integrity and availability of data or the system.
A flaw was found in Axios, a promise-based HTTP client. This vulnerability, known as Prototype Pollution, can be exploited through a specific "Gadget" attack chain. This allows an attacker to escalate a Prototype Pollution vulnerability in a third-party dependency, potentially leading to remote code execution or a full cloud compromise, such as bypassing AWS IMDSv2.
A flaw was found in follow-redirects. When an HTTP request follows a cross-domain redirect (a redirection to a different domain), custom authentication headers, such as X-API-Key or X-Auth-Token, are not properly stripped. This allows these sensitive headers to be forwarded verbatim to the redirect target, potentially leading to the unintended disclosure of authentication information to an untrusted third party.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Developer Hub 1.9.4 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Developer Hub (RHDH) is Red Hat\u0027s enterprise-grade, self-managed, customizable developer portal based on Backstage.io. RHDH is supported on OpenShift and other major Kubernetes clusters (AKS, EKS, GKE). The core features of RHDH include a single pane of glass, a centralized software catalog, self-service via golden path templates, and Tech Docs. RHDH is extensible by plugins.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:13826",
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-62718",
"url": "https://access.redhat.com/security/cve/CVE-2025-62718"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69534",
"url": "https://access.redhat.com/security/cve/CVE-2025-69534"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1525",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1526",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1528",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-2229",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27601",
"url": "https://access.redhat.com/security/cve/CVE-2026-27601"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27904",
"url": "https://access.redhat.com/security/cve/CVE-2026-27904"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-29063",
"url": "https://access.redhat.com/security/cve/CVE-2026-29063"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-29074",
"url": "https://access.redhat.com/security/cve/CVE-2026-29074"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-29186",
"url": "https://access.redhat.com/security/cve/CVE-2026-29186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-3118",
"url": "https://access.redhat.com/security/cve/CVE-2026-3118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32141",
"url": "https://access.redhat.com/security/cve/CVE-2026-32141"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32280",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32282",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33228",
"url": "https://access.redhat.com/security/cve/CVE-2026-33228"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33891",
"url": "https://access.redhat.com/security/cve/CVE-2026-33891"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33894",
"url": "https://access.redhat.com/security/cve/CVE-2026-33894"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33895",
"url": "https://access.redhat.com/security/cve/CVE-2026-33895"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33896",
"url": "https://access.redhat.com/security/cve/CVE-2026-33896"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-39983",
"url": "https://access.redhat.com/security/cve/CVE-2026-39983"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-40175",
"url": "https://access.redhat.com/security/cve/CVE-2026-40175"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-40895",
"url": "https://access.redhat.com/security/cve/CVE-2026-40895"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4800",
"url": "https://access.redhat.com/security/cve/CVE-2026-4800"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4926",
"url": "https://access.redhat.com/security/cve/CVE-2026-4926"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://catalog.redhat.com/search?gs\u0026searchType=containers\u0026q=rhdh",
"url": "https://catalog.redhat.com/search?gs\u0026searchType=containers\u0026q=rhdh"
},
{
"category": "external",
"summary": "https://developers.redhat.com/rhdh/overview",
"url": "https://developers.redhat.com/rhdh/overview"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_developer_hub",
"url": "https://docs.redhat.com/en/documentation/red_hat_developer_hub"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13254",
"url": "https://issues.redhat.com/browse/RHIDP-13254"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13255",
"url": "https://issues.redhat.com/browse/RHIDP-13255"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13256",
"url": "https://issues.redhat.com/browse/RHIDP-13256"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13257",
"url": "https://issues.redhat.com/browse/RHIDP-13257"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13258",
"url": "https://issues.redhat.com/browse/RHIDP-13258"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13259",
"url": "https://issues.redhat.com/browse/RHIDP-13259"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-13260",
"url": "https://issues.redhat.com/browse/RHIDP-13260"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_13826.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Developer Hub 1.9.4 release.",
"tracking": {
"current_release_date": "2026-05-06T09:05:56+00:00",
"generator": {
"date": "2026-05-06T09:05:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:13826",
"initial_release_date": "2026-05-05T16:10:46+00:00",
"revision_history": [
{
"date": "2026-05-05T16:10:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-05T16:10:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T09:05:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Hub 1.9",
"product": {
"name": "Red Hat Developer Hub 1.9",
"product_id": "Red Hat Developer Hub 1.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhdh:1.9::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Hub"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-hub-rhel9@sha256%3A80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1777903262"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-rhel9-operator@sha256%3A7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1777902709"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-operator-bundle@sha256%3A47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1777909942"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64 as a component of Red Hat Developer Hub 1.9",
"product_id": "Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64 as a component of Red Hat Developer Hub 1.9",
"product_id": "Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64 as a component of Red Hat Developer Hub 1.9",
"product_id": "Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-62718",
"cwe": {
"id": "CWE-1289",
"name": "Improper Validation of Unsafe Equivalence in Input"
},
"discovery_date": "2026-04-09T15:01:48.111177+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456913"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Axios, a promise-based HTTP client. This vulnerability occurs because Axios does not correctly handle hostname normalization when evaluating NO_PROXY rules. An attacker can exploit this by crafting requests to loopback addresses (e.g., localhost. or [::1]) which bypass the NO_PROXY configuration and are routed through the configured proxy. This can lead to Server-Side Request Forgery (SSRF) vulnerabilities, enabling attackers to access sensitive internal or loopback services that should otherwise be protected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios: Server-Side Request Forgery and proxy bypass due to improper hostname normalization",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has limited impact due to combination of non-default conditions to exploit: the attacker must be able to control or influence URLs passed to axios in a server-side context, the application must have both `HTTP_PROXY` and `NO_PROXY` configured, and the proxy itself must be positioned to act on the misdirected traffic or have been compromised by the attacker to intercept the rerouted traffic.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-62718"
},
{
"category": "external",
"summary": "RHBZ#2456913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-62718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-62718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62718"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc1034#section-3.1",
"url": "https://datatracker.ietf.org/doc/html/rfc1034#section-3.1"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.2",
"url": "https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.2"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/fb3befb6daac6cad26b2e54094d0f2d9e47f24df",
"url": "https://github.com/axios/axios/commit/fb3befb6daac6cad26b2e54094d0f2d9e47f24df"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/pull/10661",
"url": "https://github.com/axios/axios/pull/10661"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.15.0",
"url": "https://github.com/axios/axios/releases/tag/v1.15.0"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-3p68-rc4w-qgx5",
"url": "https://github.com/axios/axios/security/advisories/GHSA-3p68-rc4w-qgx5"
}
],
"release_date": "2026-04-09T14:31:46.067000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "axios: Axios: Server-Side Request Forgery and proxy bypass due to improper hostname normalization"
},
{
"cve": "CVE-2025-69534",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2026-03-05T16:01:10.432461+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2444839"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Python-Markdown. Parsing crafted markdown content containing malformed HTML-like sequences causes html.parser.HTMLParser to raise an unhandled AssertionError. This unhandled exception allows an attacker to cause an application crash and potentially disclose sensitive information via its stack trace.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-markdown: denial of service via malformed HTML-like sequences",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to supply a specially crafted payload to be processed by an application using Python-Markdown. Additionally, the security impact of this vulnerability is limited to an information disclosure via the unhandled exception stack trace and a denial of service. There is no memory corruption or arbitrary command execution. Due to these reasons, this issue has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69534"
},
{
"category": "external",
"summary": "RHBZ#2444839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444839"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69534"
},
{
"category": "external",
"summary": "https://github.com/Python-Markdown/markdown",
"url": "https://github.com/Python-Markdown/markdown"
},
{
"category": "external",
"summary": "https://github.com/Python-Markdown/markdown/actions/runs/15736122892",
"url": "https://github.com/Python-Markdown/markdown/actions/runs/15736122892"
},
{
"category": "external",
"summary": "https://github.com/Python-Markdown/markdown/issues/1534",
"url": "https://github.com/Python-Markdown/markdown/issues/1534"
}
],
"release_date": "2026-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, wrap your markdown parsing function in a try/except block. This catches the unhandled exception, preventing both the application crash and the stack trace leak.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "python-markdown: denial of service via malformed HTML-like sequences"
},
{
"cve": "CVE-2026-1525",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2026-03-12T21:01:33.639277+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447144"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici, a Node.js HTTP/1.1 client. A remote attacker could exploit this vulnerability by sending HTTP/1.1 requests that include duplicate Content-Length headers with different casing (e.g., \"Content-Length\" and \"content-length\"). This can lead to HTTP Request Smuggling, a technique where an attacker sends an ambiguous request that is interpreted differently by a proxy and a backend server. Successful exploitation could result in unauthorized access, cache poisoning, or credential hijacking. It may also cause a Denial of Service (DoS) if strict HTTP parsers reject the malformed requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Moderate impact. A flaw in the undici Node.js HTTP/1.1 client allows for HTTP Request Smuggling or Denial of Service. This can occur in Red Hat products that use undici and process HTTP requests where user-controlled header names are not case-normalized, or headers are passed as flat arrays.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1525"
},
{
"category": "external",
"summary": "RHBZ#2447144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1525"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://cwe.mitre.org/data/definitions/444.html",
"url": "https://cwe.mitre.org/data/definitions/444.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3556037",
"url": "https://hackerone.com/reports/3556037"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6"
}
],
"release_date": "2026-03-12T19:56:55.092000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers"
},
{
"cve": "CVE-2026-1526",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T21:01:25.538271+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker can exploit this vulnerability by sending a specially crafted compressed frame, known as a \"decompression bomb,\" during permessage-deflate decompression. The undici WebSocket client does not properly limit the size of decompressed data, leading to unbounded memory consumption. This can cause the Node.js process to exhaust available memory, resulting in a denial of service (DoS) where the process crashes or becomes unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1526"
},
{
"category": "external",
"summary": "RHBZ#2447142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1526"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3481206",
"url": "https://hackerone.com/reports/3481206"
}
],
"release_date": "2026-03-12T20:08:05.950000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression"
},
{
"cve": "CVE-2026-1528",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:36.954017+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447145"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici\u0027s ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: undici: Denial of Service via crafted WebSocket frame with large length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1528"
},
{
"category": "external",
"summary": "RHBZ#2447145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1528",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1528"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1528"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3537648",
"url": "https://hackerone.com/reports/3537648"
}
],
"release_date": "2026-03-12T20:21:57.775000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: undici: Denial of Service via crafted WebSocket frame with large length"
},
{
"cve": "CVE-2026-2229",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2026-03-12T21:01:29.187989+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447143"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the undici WebSocket client. A remote malicious server can exploit this vulnerability by sending a WebSocket frame with an invalid `server_max_window_bits` parameter within the permessage-deflate extension. This improper validation causes the client\u0027s Node.js process to terminate, leading to a denial-of-service (DoS) condition for the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2229"
},
{
"category": "external",
"summary": "RHBZ#2447143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2229"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc7692",
"url": "https://datatracker.ietf.org/doc/html/rfc7692"
},
{
"category": "external",
"summary": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8",
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3487486",
"url": "https://hackerone.com/reports/3487486"
},
{
"category": "external",
"summary": "https://nodejs.org/api/zlib.html#class-zlibinflateraw",
"url": "https://nodejs.org/api/zlib.html#class-zlibinflateraw"
}
],
"release_date": "2026-03-12T20:27:05.600000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter"
},
{
"acknowledgments": [
{
"names": [
"Thibault Guittet"
]
}
],
"cve": "CVE-2026-3118",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2026-02-24T12:08:42.955000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2442273"
}
],
"notes": [
{
"category": "description",
"text": "A security flaw was identified in the Orchestrator Plugin of Red Hat Developer Hub (Backstage). The issue occurs due to insufficient input validation in GraphQL query handling. An authenticated user can inject specially crafted input into API requests, which disrupts backend query processing. This results in the entire Backstage application crashing and restarting, leading to a platform-wide Denial of Service (DoS). As a result, legitimate users temporarily lose access to the platform.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rhdh: GraphQL Injection Leading to Platform-Wide Denial of Service (DoS) in RH Developer Hub Orchestrator Plugin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact vulnerability in the Orchestrator Plugin of Red Hat Developer Hub (Backstage) allows an authenticated attacker to cause a platform-wide Denial of Service. By injecting specially crafted input into GraphQL API requests, an attacker can disrupt backend query processing, leading to the application crashing and restarting. This issue temporarily prevents legitimate users from accessing the platform.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-3118"
},
{
"category": "external",
"summary": "RHBZ#2442273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-3118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3118"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-3118",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3118"
}
],
"release_date": "2026-02-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict network access to the Red Hat Developer Hub instance to trusted users and networks only. This limits the exposure of the vulnerable Orchestrator Plugin to unauthorized access.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rhdh: GraphQL Injection Leading to Platform-Wide Denial of Service (DoS) in RH Developer Hub Orchestrator Plugin"
},
{
"cve": "CVE-2026-4800",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2026-03-31T20:01:21.918257+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453496"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in lodash. The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: lodash: Arbitrary code execution via untrusted input in template imports",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the context of Red Hat Enterprise Linux, the grafana and grafana-pcp packages execute the affected JavaScript entirely client-side within the user\u0027s browser. Consequently, the attack surface is strictly restricted to the local browser environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4800"
},
{
"category": "external",
"summary": "RHBZ#2453496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4800",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4800"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
"url": "https://github.com/advisories/GHSA-35jh-r3h4-6jhm"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
"url": "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c"
}
],
"release_date": "2026-03-31T19:25:55.987000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: lodash: Arbitrary code execution via untrusted input in template imports"
},
{
"cve": "CVE-2026-4926",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-03-26T20:03:28.427630+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in path-to-regexp. A remote attacker could exploit this vulnerability by providing specially crafted input that generates a regular expression with multiple sequential optional groups. This leads to an exponential growth in the generated regular expression, causing a Denial of Service (DoS) due to excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "path-to-regexp: path-to-regexp: Denial of Service via crafted regular expressions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important flaw in `path-to-regexp` that can lead to a Denial of Service. The vulnerability occurs when specially crafted input containing multiple sequential optional groups is used to generate regular expressions, causing exponential resource consumption.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4926"
},
{
"category": "external",
"summary": "RHBZ#2451867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4926",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4926"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
}
],
"release_date": "2026-03-26T18:59:38+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, limit the use of multiple sequential optional groups in route patterns within applications that use `path-to-regexp`. Additionally, avoid directly passing user-controlled input as route patterns to prevent the generation of maliciously crafted regular expressions.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "path-to-regexp: path-to-regexp: Denial of Service via crafted regular expressions"
},
{
"cve": "CVE-2026-27601",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"discovery_date": "2026-03-03T23:01:58.011378+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2444247"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Underscore.js, a JavaScript utility library. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) attack by providing specially crafted recursive data structures. When these structures are processed by the _.flatten or _.isEqual functions, which lack a depth limit for recursion, a stack overflow occurs. This can make the application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Underscore.js: Underscore.js: Denial of Service via recursive data structures in flatten and isEqual functions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27601"
},
{
"category": "external",
"summary": "RHBZ#2444247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444247"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27601",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27601"
},
{
"category": "external",
"summary": "https://github.com/jashkenas/underscore/commit/411e222eb0ca5d570cc4f6315c02c05b830ed2b4",
"url": "https://github.com/jashkenas/underscore/commit/411e222eb0ca5d570cc4f6315c02c05b830ed2b4"
},
{
"category": "external",
"summary": "https://github.com/jashkenas/underscore/commit/a6e23ae9647461ec33ad9f92a2ecfc220eea0a84",
"url": "https://github.com/jashkenas/underscore/commit/a6e23ae9647461ec33ad9f92a2ecfc220eea0a84"
},
{
"category": "external",
"summary": "https://github.com/jashkenas/underscore/security/advisories/GHSA-qpx9-hpmf-5gmw",
"url": "https://github.com/jashkenas/underscore/security/advisories/GHSA-qpx9-hpmf-5gmw"
}
],
"release_date": "2026-03-03T22:38:38.955000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications utilizing Underscore.js should ensure that any processing of untrusted, recursively structured data with `_.flatten` or `_.isEqual` explicitly enforces a finite depth limit. Review application code to identify and modify calls to these functions, adding appropriate depth parameters to prevent stack overflow conditions. Additionally, input validation should be implemented to sanitize untrusted data before it is processed by Underscore.js functions.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Underscore.js: Underscore.js: Denial of Service via recursive data structures in flatten and isEqual functions"
},
{
"cve": "CVE-2026-27904",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2026-02-26T02:01:23.004531+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2442922"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in minimatch. A remote attacker could exploit this vulnerability by providing a specially crafted glob expression with nested unbounded quantifiers. This could lead to catastrophic backtracking in the V8 JavaScript engine, causing the application to become unresponsive and resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this flaw requires that a user or service processes untrusted input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27904"
},
{
"category": "external",
"summary": "RHBZ#2442922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442922"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27904"
},
{
"category": "external",
"summary": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74",
"url": "https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74"
}
],
"release_date": "2026-02-26T01:07:42.693000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions"
},
{
"cve": "CVE-2026-29063",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2026-03-06T19:00:57.982727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Immutable.js, a library for persistent immutable data structures. This vulnerability, known as Prototype Pollution, allows an attacker with low privileges to inject unwanted properties into core JavaScript object prototypes without user interaction. By manipulating specific APIs such as mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject(), a remote attacker could potentially execute arbitrary code or cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "immutable-js: Immutable.js: Arbitrary code execution via Prototype Pollution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this vulnerability requires that an attacker is able to provide arbitrary data to clients of this library in a way that calls the affected functions with data the attacker controls. In most deployments, the ability to provide data in this fashion requires that an attacker has some degree of privileges to access the affected applications.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-29063"
},
{
"category": "external",
"summary": "RHBZ#2445291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-29063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29063"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-29063",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29063"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw",
"url": "https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw"
}
],
"release_date": "2026-03-06T18:25:22.438000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "immutable-js: Immutable.js: Arbitrary code execution via Prototype Pollution"
},
{
"cve": "CVE-2026-29074",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2026-03-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445132"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SVGO, an SVG (Scalable Vector Graphics) Optimizer. This vulnerability allows a remote attacker to cause a Denial of Service (DoS) by submitting a specially crafted XML file. The application\u0027s failure to properly guard against XML entity expansion or recursion can lead to the Node.js process consuming excessive memory and crashing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "svgo: SVGO: Denial of Service via XML entity expansion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-29074"
},
{
"category": "external",
"summary": "RHBZ#2445132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445132"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-29074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29074"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-29074",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29074"
},
{
"category": "external",
"summary": "https://github.com/svg/svgo/security/advisories/GHSA-xpqw-6gx7-v673",
"url": "https://github.com/svg/svgo/security/advisories/GHSA-xpqw-6gx7-v673"
}
],
"release_date": "2026-03-06T07:23:05.716000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "svgo: SVGO: Denial of Service via XML entity expansion"
},
{
"cve": "CVE-2026-29186",
"cwe": {
"id": "CWE-791",
"name": "Incomplete Filtering of Special Elements"
},
"discovery_date": "2026-03-07T16:01:40.949207+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445480"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Backstage. The backstage/plugin-techdocs-node package uses an allowlist to filter dangerous MkDocs configuration keys during the documentation build process. A gap in this allowlist allows attackers to craft an mkdocs.yml file that causes arbitrary Python code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "backstage/plugin-techdocs-node: TechDocs Mkdocs configuration key enables arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs commit access to a repository that Backstage is configured to track and build in order to introduce a malicious mkdocs.yml file into the TechDocs build pipeline. Additionally, an attacker can execute arbitrary Python code but the payload is confined by the permissions granted to the TechDocs build process which is typically a restricted service account, limiting the impact of this vulnerability. Due to these reasons, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-29186"
},
{
"category": "external",
"summary": "RHBZ#2445480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445480"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-29186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-29186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29186"
},
{
"category": "external",
"summary": "https://github.com/backstage/backstage/security/advisories/GHSA-928r-fm4v-mvrw",
"url": "https://github.com/backstage/backstage/security/advisories/GHSA-928r-fm4v-mvrw"
}
],
"release_date": "2026-03-07T15:03:51.422000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "To mitigate this issue, enable docker isolation by updating the Backstage configuration to use \u0027runIn: docker\u0027 instead of \u0027runIn: local\u0027, confining the arbitrary Python code execution to a containerized environment. Additionally, limit commit access to repositories tracked by Backstage to trusted contributors only, and enforce mandatory pull request (PR) reviews for any modifications made to the mkdocs.yml file.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "backstage/plugin-techdocs-node: TechDocs Mkdocs configuration key enables arbitrary code execution"
},
{
"cve": "CVE-2026-32141",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-03-12T19:01:30.987208+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447083"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the flatted npm library. flatted\u0027s parse() function uses a recursive revive() phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential $ indices, the recursion depth is unbounded, causing a stack overflow that crashes the Node.js process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flatted: flatted: Unbounded recursion DoS in parse() revive phase",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32141"
},
{
"category": "external",
"summary": "RHBZ#2447083",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447083"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32141"
},
{
"category": "external",
"summary": "https://github.com/WebReflection/flatted/commit/7eb65d857e1a40de11c47461cdbc8541449f0606",
"url": "https://github.com/WebReflection/flatted/commit/7eb65d857e1a40de11c47461cdbc8541449f0606"
},
{
"category": "external",
"summary": "https://github.com/WebReflection/flatted/pull/88",
"url": "https://github.com/WebReflection/flatted/pull/88"
},
{
"category": "external",
"summary": "https://github.com/WebReflection/flatted/security/advisories/GHSA-25h7-pfq9-p65f",
"url": "https://github.com/WebReflection/flatted/security/advisories/GHSA-25h7-pfq9-p65f"
}
],
"release_date": "2026-03-12T18:08:09.634000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flatted: flatted: Unbounded recursion DoS in parse() revive phase"
},
{
"cve": "CVE-2026-32280",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-04-08T02:01:19.572351+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456339"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "RHBZ#2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://go.dev/cl/758320",
"url": "https://go.dev/cl/758320"
},
{
"category": "external",
"summary": "https://go.dev/issue/78282",
"url": "https://go.dev/issue/78282"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4947",
"url": "https://pkg.go.dev/vuln/GO-2026-4947"
}
],
"release_date": "2026-04-08T01:06:58.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building"
},
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-33228",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2026-03-21T00:01:43.424803+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in flatted, a JavaScript Object Notation (JSON) parser designed for handling circular data structures. A remote attacker can exploit this vulnerability by providing specially crafted JSON input. The parse() function in flatted fails to properly validate string values used as array index keys, allowing an attacker to manipulate internal JavaScript object prototypes. This prototype pollution can enable an attacker to execute arbitrary code or cause a denial of service, impacting the availability and integrity of affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flatted: Flatted: Prototype pollution vulnerability allows arbitrary code execution via crafted JSON.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A Critical vulnerability was discovered in \u0027flatted\u0027, a JavaScript JSON parser. It could enable a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service. Exploitation involves prototype pollution by providing a specially crafted JSON input. Red Hat products that process un-trusted JSON data and utilize the \u0027flatted\u0027 library are at risk if they do not properly sanitize input.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33228"
},
{
"category": "external",
"summary": "RHBZ#2449872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33228"
},
{
"category": "external",
"summary": "https://github.com/WebReflection/flatted/commit/885ddcc33cf9657caf38c57c7be45ae1c5272802",
"url": "https://github.com/WebReflection/flatted/commit/885ddcc33cf9657caf38c57c7be45ae1c5272802"
},
{
"category": "external",
"summary": "https://github.com/WebReflection/flatted/releases/tag/v3.4.2",
"url": "https://github.com/WebReflection/flatted/releases/tag/v3.4.2"
},
{
"category": "external",
"summary": "https://github.com/WebReflection/flatted/security/advisories/GHSA-rf6f-7fwh-wjgh",
"url": "https://github.com/WebReflection/flatted/security/advisories/GHSA-rf6f-7fwh-wjgh"
}
],
"release_date": "2026-03-20T23:06:48.485000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flatted: Flatted: Prototype pollution vulnerability allows arbitrary code execution via crafted JSON."
},
{
"cve": "CVE-2026-33891",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"discovery_date": "2026-03-27T21:01:34.410210+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2452450"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the node-forge library, a JavaScript implementation of Transport Layer Security. This vulnerability, inherited from the bundled jsbn library, allows a remote attacker to cause a Denial of Service (DoS). When the BigInteger.modInverse() function is called with a zero value, it enters an infinite loop, causing the process to hang indefinitely and consume 100% of the CPU resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Denial of Service via infinite loop in BigInteger.modInverse()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33891"
},
{
"category": "external",
"summary": "RHBZ#2452450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2452450"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33891",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33891"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/9bb8d67b99d17e4ebb5fd7596cd699e11f25d023",
"url": "https://github.com/digitalbazaar/forge/commit/9bb8d67b99d17e4ebb5fd7596cd699e11f25d023"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5m6q-g25r-mvwx",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5m6q-g25r-mvwx"
}
],
"release_date": "2026-03-27T20:43:37.725000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Denial of Service via infinite loop in BigInteger.modInverse()"
},
{
"cve": "CVE-2026-33894",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2026-03-27T21:02:52.462999+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2452464"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Forge (also called `node-forge`), a JavaScript implementation of Transport Layer Security. A remote attacker could exploit weaknesses in the RSASSA PKCS#1 v1.5 signature verification process. By crafting malicious signatures that include extra data within the ASN structure and do not meet padding requirements, an attacker can bypass signature validation. This allows for the creation of forged signatures that appear legitimate, potentially compromising the integrity and authenticity of communications.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: Forge: Signature Forgery via Weak RSASSA PKCS#1 v1.5 Verification",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33894"
},
{
"category": "external",
"summary": "RHBZ#2452464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2452464"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33894",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33894"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33894",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33894"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc2313#section-8",
"url": "https://datatracker.ietf.org/doc/html/rfc2313#section-8"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-ppp5-5v6c-4jwp",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-ppp5-5v6c-4jwp"
},
{
"category": "external",
"summary": "https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE",
"url": "https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc8017.html",
"url": "https://www.rfc-editor.org/rfc/rfc8017.html"
}
],
"release_date": "2026-03-27T20:45:49.583000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: Forge: Signature Forgery via Weak RSASSA PKCS#1 v1.5 Verification"
},
{
"cve": "CVE-2026-33895",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2026-03-27T21:02:18.484291+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2452457"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Forge (also called `node-forge`), a JavaScript library used for Transport Layer Security (TLS). The library\u0027s Ed25519 signature verification process does not correctly validate cryptographic signatures, allowing forged non-canonical signatures to be accepted. A remote attacker could exploit this signature malleability to bypass authentication and authorization logic. This vulnerability can also circumvent security checks in applications that rely on the uniqueness of cryptographic signatures for functions such as deduplication or preventing replay attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: Forge: Authentication bypass via forged Ed25519 cryptographic signatures",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33895"
},
{
"category": "external",
"summary": "RHBZ#2452457",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2452457"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33895",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33895"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33895",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33895"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc8032#section-8.4",
"url": "https://datatracker.ietf.org/doc/html/rfc8032#section-8.4"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/bdecf11571c9f1a487cc0fe72fe78ff6dfa96b85",
"url": "https://github.com/digitalbazaar/forge/commit/bdecf11571c9f1a487cc0fe72fe78ff6dfa96b85"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-q67f-28xg-22rw",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-q67f-28xg-22rw"
}
],
"release_date": "2026-03-27T20:47:54.492000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: Forge: Authentication bypass via forged Ed25519 cryptographic signatures"
},
{
"cve": "CVE-2026-33896",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-27T21:02:22.762233+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2452458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Forge (also known as node-forge), a JavaScript implementation of Transport Layer Security (TLS). The `pki.verifyCertificateChain()` function does not properly enforce certificate validation rules. This oversight allows an intermediate certificate that lacks specific security extensions to enable any leaf certificate to function as a Certificate Authority (CA) and sign other certificates. Consequently, node-forge could accept these unauthorized certificates as valid, potentially leading to spoofing or the issuance of illegitimate certificates.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: Forge (node-forge): Certificate validation bypass allows unauthorized certificate issuance",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33896"
},
{
"category": "external",
"summary": "RHBZ#2452458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2452458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33896",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33896"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33896",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33896"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/2e492832fb25227e6b647cbe1ac981c123171e90",
"url": "https://github.com/digitalbazaar/forge/commit/2e492832fb25227e6b647cbe1ac981c123171e90"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2328-f5f3-gj25",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2328-f5f3-gj25"
}
],
"release_date": "2026-03-27T20:50:03.418000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: Forge (node-forge): Certificate validation bypass allows unauthorized certificate issuance"
},
{
"cve": "CVE-2026-39983",
"cwe": {
"id": "CWE-93",
"name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
},
"discovery_date": "2026-04-09T18:02:16.209487+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456971"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in basic-ftp, an FTP client for Node.js. A remote attacker can exploit this vulnerability by injecting Carriage Return Line Feed (CRLF) sequences into file path parameters used by high-level APIs. This allows the attacker to split a single intended FTP command into multiple commands. Such command injection can lead to the execution of arbitrary commands, potentially compromising the integrity and availability of data or the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "basic-ftp: basic-ftp: Command injection via CRLF sequences in file path parameters",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-39983"
},
{
"category": "external",
"summary": "RHBZ#2456971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456971"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-39983",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-39983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-39983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39983"
},
{
"category": "external",
"summary": "https://github.com/patrickjuchli/basic-ftp/commit/2ecc8e2c500c5234115f06fd1dbde1aa03d70f4b",
"url": "https://github.com/patrickjuchli/basic-ftp/commit/2ecc8e2c500c5234115f06fd1dbde1aa03d70f4b"
},
{
"category": "external",
"summary": "https://github.com/patrickjuchli/basic-ftp/releases/tag/v5.2.1",
"url": "https://github.com/patrickjuchli/basic-ftp/releases/tag/v5.2.1"
},
{
"category": "external",
"summary": "https://github.com/patrickjuchli/basic-ftp/security/advisories/GHSA-chqc-8p9q-pq6q",
"url": "https://github.com/patrickjuchli/basic-ftp/security/advisories/GHSA-chqc-8p9q-pq6q"
}
],
"release_date": "2026-04-09T17:05:46.228000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "basic-ftp: basic-ftp: Command injection via CRLF sequences in file path parameters"
},
{
"cve": "CVE-2026-40175",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2026-04-10T20:02:10.296601+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Axios, a promise-based HTTP client. This vulnerability, known as Prototype Pollution, can be exploited through a specific \"Gadget\" attack chain. This allows an attacker to escalate a Prototype Pollution vulnerability in a third-party dependency, potentially leading to remote code execution or a full cloud compromise, such as bypassing AWS IMDSv2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios: Remote Code Execution via Prototype Pollution escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Axios library, a promise-based HTTP client, is susceptible to an Important prototype pollution vulnerability. This flaw, when combined with specific \"Gadget\" attack chains in third-party dependencies, can lead to remote code execution or full cloud compromise, including bypassing AWS IMDSv2.\n \nWith pollution check patch available in Axios gives an advantage, it remains vulnerable due to HTTP Header Sanitation and Server-Side Request Forgery threat.\n\nRed Hat products that incorporate the vulnerable Axios library are affected.\n\nThe openshift4/ose-monitoring-plugin-rhel9 container image is not vulnerable to this flaw. The affected component is used as a build-time dependency but it\u0027s not shipped in the final product, meaning the flaw is not present thus cannot be exploited in the container deployments.\n\nRegarding openshift4/ose-console for Product stream 4.12 and 4.13, the vulnerable component is present (indirect dependency), but the vulnerability is not exploitable in our case due to the browser runtime, where the required Node.js-specific attack vectors are not available. With this, the impact becomes low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-40175"
},
{
"category": "external",
"summary": "RHBZ#2457432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40175"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-40175",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40175"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/363185461b90b1b78845dc8a99a1f103d9b122a1",
"url": "https://github.com/axios/axios/commit/363185461b90b1b78845dc8a99a1f103d9b122a1"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/pull/10660",
"url": "https://github.com/axios/axios/pull/10660"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.15.0",
"url": "https://github.com/axios/axios/releases/tag/v1.15.0"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx",
"url": "https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx"
}
],
"release_date": "2026-04-10T19:23:52.285000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "axios: Axios: Remote Code Execution via Prototype Pollution escalation"
},
{
"cve": "CVE-2026-40895",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2026-04-21T21:02:33.280553+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2460297"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in follow-redirects. When an HTTP request follows a cross-domain redirect (a redirection to a different domain), custom authentication headers, such as X-API-Key or X-Auth-Token, are not properly stripped. This allows these sensitive headers to be forwarded verbatim to the redirect target, potentially leading to the unintended disclosure of authentication information to an untrusted third party.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "follow-redirects: follow-redirects: Information disclosure via cross-domain redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-40895"
},
{
"category": "external",
"summary": "RHBZ#2460297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-40895",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40895"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-40895",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40895"
},
{
"category": "external",
"summary": "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-r4q5-vmmm-2653",
"url": "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-r4q5-vmmm-2653"
}
],
"release_date": "2026-04-21T19:59:59.759000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T16:10:46+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:13826"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:80453720616cee369e9f79863ef1815a2741afdeb25d3572085d11ad54afa9a0_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:47c3fc5bfb21e980f0fa6c510c48c97982649c7f27d9d486a19391c56c9531ff_amd64",
"Red Hat Developer Hub 1.9:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:7118207df52574eb4eb9a6b35aa23eef8029937c2ace807b5e132bcc5188a972_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "follow-redirects: follow-redirects: Information disclosure via cross-domain redirects"
}
]
}
RHSA-2026:10217
Vulnerability from csaf_redhat - Published: 2026-04-23 21:39 - Updated: 2026-05-06 09:05A flaw was found in the Go programming language (golang) and its command-line tool (cmd/go). A remote attacker could exploit this during the build process by crafting malicious SWIG (Simplified Wrapper and Interface Generator) file names that contain "cgo" and specific payloads. This could lead to code smuggling and arbitrary code execution, bypassing trust mechanisms and allowing the attacker to run unauthorized code.
A flaw was found in the cmd/compile package in the Go standard library. The compiler fails to correctly check for integer overflow or underflow in arithmetic operations involving loop induction variables. As a result, the compiler allows invalid memory indexing to occur at runtime, potentially leading to memory corruption.
A flaw was found in the cmd/compile package in the Go standard library. A no-op interface conversion prevented the compiler from correctly identifying non-overlapping memory moves. As a result, the compiler allows unsafe memory move operations to occur at runtime, potentially causing data corruption, memory corruption or unexpected application behavior.
A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.
A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282)\n\n* crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283)\n\n* crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building (CVE-2026-32280)\n\n* golang: cmd/compile: no-op interface conversion bypasses overlap checking (CVE-2026-27144)\n\n* cmd/go: golang: Go (golang) and cmd/go: Arbitrary Code Execution via malicious SWIG file names (CVE-2026-27140)\n\n* golang: cmd/compile: possible memory corruption after bound check elimination (CVE-2026-27143)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10217",
"url": "https://access.redhat.com/errata/RHSA-2026:10217"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "2456340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456340"
},
{
"category": "external",
"summary": "2456341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456341"
},
{
"category": "external",
"summary": "2456342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456342"
},
{
"category": "external",
"summary": "RHEL-169928",
"url": "https://issues.redhat.com/browse/RHEL-169928"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10217.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-05-06T09:05:31+00:00",
"generator": {
"date": "2026-05-06T09:05:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:10217",
"initial_release_date": "2026-04-23T21:39:53+00:00",
"revision_history": [
{
"date": "2026-04-23T21:39:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T21:39:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T09:05:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.9-3.el10_1.aarch64",
"product": {
"name": "go-toolset-0:1.25.9-3.el10_1.aarch64",
"product_id": "go-toolset-0:1.25.9-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.9-3.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-3.el10_1.aarch64",
"product": {
"name": "golang-0:1.25.9-3.el10_1.aarch64",
"product_id": "golang-0:1.25.9-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-3.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.9-3.el10_1.aarch64",
"product": {
"name": "golang-bin-0:1.25.9-3.el10_1.aarch64",
"product_id": "golang-bin-0:1.25.9-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.9-3.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.9-3.el10_1.aarch64",
"product": {
"name": "golang-race-0:1.25.9-3.el10_1.aarch64",
"product_id": "golang-race-0:1.25.9-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.9-3.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.9-3.el10_1.ppc64le",
"product": {
"name": "go-toolset-0:1.25.9-3.el10_1.ppc64le",
"product_id": "go-toolset-0:1.25.9-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.9-3.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-3.el10_1.ppc64le",
"product": {
"name": "golang-0:1.25.9-3.el10_1.ppc64le",
"product_id": "golang-0:1.25.9-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-3.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.9-3.el10_1.ppc64le",
"product": {
"name": "golang-bin-0:1.25.9-3.el10_1.ppc64le",
"product_id": "golang-bin-0:1.25.9-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.9-3.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.9-3.el10_1.ppc64le",
"product": {
"name": "golang-race-0:1.25.9-3.el10_1.ppc64le",
"product_id": "golang-race-0:1.25.9-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.9-3.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.9-3.el10_1.s390x",
"product": {
"name": "go-toolset-0:1.25.9-3.el10_1.s390x",
"product_id": "go-toolset-0:1.25.9-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.9-3.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-3.el10_1.s390x",
"product": {
"name": "golang-0:1.25.9-3.el10_1.s390x",
"product_id": "golang-0:1.25.9-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-3.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.9-3.el10_1.s390x",
"product": {
"name": "golang-bin-0:1.25.9-3.el10_1.s390x",
"product_id": "golang-bin-0:1.25.9-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.9-3.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.9-3.el10_1.s390x",
"product": {
"name": "golang-race-0:1.25.9-3.el10_1.s390x",
"product_id": "golang-race-0:1.25.9-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.9-3.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.9-3.el10_1.x86_64",
"product": {
"name": "go-toolset-0:1.25.9-3.el10_1.x86_64",
"product_id": "go-toolset-0:1.25.9-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.9-3.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.9-3.el10_1.x86_64",
"product": {
"name": "golang-0:1.25.9-3.el10_1.x86_64",
"product_id": "golang-0:1.25.9-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-3.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.9-3.el10_1.x86_64",
"product": {
"name": "golang-bin-0:1.25.9-3.el10_1.x86_64",
"product_id": "golang-bin-0:1.25.9-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.9-3.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.9-3.el10_1.x86_64",
"product": {
"name": "golang-race-0:1.25.9-3.el10_1.x86_64",
"product_id": "golang-race-0:1.25.9-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.9-3.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.9-3.el10_1.src",
"product": {
"name": "golang-0:1.25.9-3.el10_1.src",
"product_id": "golang-0:1.25.9-3.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.9-3.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.9-3.el10_1.noarch",
"product": {
"name": "golang-docs-0:1.25.9-3.el10_1.noarch",
"product_id": "golang-docs-0:1.25.9-3.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.9-3.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.9-3.el10_1.noarch",
"product": {
"name": "golang-misc-0:1.25.9-3.el10_1.noarch",
"product_id": "golang-misc-0:1.25.9-3.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.9-3.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.9-3.el10_1.noarch",
"product": {
"name": "golang-src-0:1.25.9-3.el10_1.noarch",
"product_id": "golang-src-0:1.25.9-3.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.9-3.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.9-3.el10_1.noarch",
"product": {
"name": "golang-tests-0:1.25.9-3.el10_1.noarch",
"product_id": "golang-tests-0:1.25.9-3.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.9-3.el10_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.9-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64"
},
"product_reference": "go-toolset-0:1.25.9-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.9-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le"
},
"product_reference": "go-toolset-0:1.25.9-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.9-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x"
},
"product_reference": "go-toolset-0:1.25.9-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.9-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64"
},
"product_reference": "go-toolset-0:1.25.9-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64"
},
"product_reference": "golang-0:1.25.9-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le"
},
"product_reference": "golang-0:1.25.9-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x"
},
"product_reference": "golang-0:1.25.9-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-3.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src"
},
"product_reference": "golang-0:1.25.9-3.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.9-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64"
},
"product_reference": "golang-0:1.25.9-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.9-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64"
},
"product_reference": "golang-bin-0:1.25.9-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.9-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le"
},
"product_reference": "golang-bin-0:1.25.9-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.9-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x"
},
"product_reference": "golang-bin-0:1.25.9-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.9-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64"
},
"product_reference": "golang-bin-0:1.25.9-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.9-3.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch"
},
"product_reference": "golang-docs-0:1.25.9-3.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.9-3.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch"
},
"product_reference": "golang-misc-0:1.25.9-3.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.9-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64"
},
"product_reference": "golang-race-0:1.25.9-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.9-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le"
},
"product_reference": "golang-race-0:1.25.9-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.9-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x"
},
"product_reference": "golang-race-0:1.25.9-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.9-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64"
},
"product_reference": "golang-race-0:1.25.9-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.9-3.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch"
},
"product_reference": "golang-src-0:1.25.9-3.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.9-3.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
},
"product_reference": "golang-tests-0:1.25.9-3.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"cwe": {
"id": "CWE-641",
"name": "Improper Restriction of Names for Files and Other Resources"
},
"discovery_date": "2026-04-08T02:01:26.299804+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456341"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go programming language (golang) and its command-line tool (cmd/go). A remote attacker could exploit this during the build process by crafting malicious SWIG (Simplified Wrapper and Interface Generator) file names that contain \"cgo\" and specific payloads. This could lead to code smuggling and arbitrary code execution, bypassing trust mechanisms and allowing the attacker to run unauthorized code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/go: golang: Go (golang) and cmd/go: Arbitrary Code Execution via malicious SWIG file names",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "RHBZ#2456341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27140",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27140"
},
{
"category": "external",
"summary": "https://go.dev/cl/763768",
"url": "https://go.dev/cl/763768"
},
{
"category": "external",
"summary": "https://go.dev/issue/78335",
"url": "https://go.dev/issue/78335"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4871",
"url": "https://pkg.go.dev/vuln/GO-2026-4871"
}
],
"release_date": "2026-04-08T01:06:57.893000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T21:39:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10217"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/go: golang: Go (golang) and cmd/go: Arbitrary Code Execution via malicious SWIG file names"
},
{
"cve": "CVE-2026-27143",
"cwe": {
"id": "CWE-733",
"name": "Compiler Optimization Removal or Modification of Security-critical Code"
},
"discovery_date": "2026-04-08T02:01:29.491546+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456342"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the cmd/compile package in the Go standard library. The compiler fails to correctly check for integer overflow or underflow in arithmetic operations involving loop induction variables. As a result, the compiler allows invalid memory indexing to occur at runtime, potentially leading to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: cmd/compile: possible memory corruption after bound check elimination",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is only exploitable in applications that contain a loop structure that relies on an induction variable. An induction variable is a variable that gets modified, usually incremented or decremented, by a predictable amount on each iteration. Inside the loop, the induction variable must be directly used as the index to access or modify elements within an array or a slice. Additionally, an attacker must be able to cause an integer overflow or underflow in the induction variable to trigger this issue. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "RHBZ#2456342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27143",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27143"
},
{
"category": "external",
"summary": "https://go.dev/cl/763765",
"url": "https://go.dev/cl/763765"
},
{
"category": "external",
"summary": "https://go.dev/issue/78333",
"url": "https://go.dev/issue/78333"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4868",
"url": "https://pkg.go.dev/vuln/GO-2026-4868"
}
],
"release_date": "2026-04-08T01:06:57.168000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T21:39:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10217"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, strictly sanitize and enforce bounds checking on any untrusted user input that influences loop counters, iteration limits, or memory indices. If there is no integer overflow or underflow, the out-of-bounds access cannot occur.",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: cmd/compile: possible memory corruption after bound check elimination"
},
{
"cve": "CVE-2026-27144",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2026-04-08T02:01:22.896153+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the cmd/compile package in the Go standard library. A no-op interface conversion prevented the compiler from correctly identifying non-overlapping memory moves. As a result, the compiler allows unsafe memory move operations to occur at runtime, potentially causing data corruption, memory corruption or unexpected application behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: cmd/compile: no-op interface conversion bypasses overlap checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable in applications that contain a memory move or copy operation that is subject to a no-op (no-operation) interface conversion. Furthermore, the source and destination memory addresses involved in the move or copy must overlap and an attacker must be able to supply an input that triggers this specific operation. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "RHBZ#2456340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27144"
},
{
"category": "external",
"summary": "https://go.dev/cl/763764",
"url": "https://go.dev/cl/763764"
},
{
"category": "external",
"summary": "https://go.dev/issue/78371",
"url": "https://go.dev/issue/78371"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4867",
"url": "https://pkg.go.dev/vuln/GO-2026-4867"
}
],
"release_date": "2026-04-08T01:06:56.908000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T21:39:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10217"
},
{
"category": "workaround",
"details": "To mitigate this issue, review code that performs memory copies or struct assignments. If data is being passed through an interface (such as \u0027any\u0027 or \u0027interface{}\u0027) just before a move operation, refactor the code to use concrete types or explicit pointers instead.",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: cmd/compile: no-op interface conversion bypasses overlap checking"
},
{
"cve": "CVE-2026-32280",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-04-08T02:01:19.572351+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456339"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "RHBZ#2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://go.dev/cl/758320",
"url": "https://go.dev/cl/758320"
},
{
"category": "external",
"summary": "https://go.dev/issue/78282",
"url": "https://go.dev/issue/78282"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4947",
"url": "https://pkg.go.dev/vuln/GO-2026-4947"
}
],
"release_date": "2026-04-08T01:06:58.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T21:39:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10217"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building"
},
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T21:39:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10217"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-32283",
"cwe": {
"id": "CWE-764",
"name": "Multiple Locks of a Critical Resource"
},
"discovery_date": "2026-04-08T02:01:16.213799+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "RHBZ#2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"category": "external",
"summary": "https://go.dev/cl/763767",
"url": "https://go.dev/cl/763767"
},
{
"category": "external",
"summary": "https://go.dev/issue/78334",
"url": "https://go.dev/issue/78334"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4870",
"url": "https://pkg.go.dev/vuln/GO-2026-4870"
}
],
"release_date": "2026-04-08T01:06:57.670000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T21:39:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10217"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.9-3.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.9-3.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.9-3.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages"
}
]
}
RHSA-2026:11803
Vulnerability from csaf_redhat - Published: 2026-04-29 15:35 - Updated: 2026-05-06 12:40A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "VolSync v0.15 General Availability release images, which provide enhancements, security fixes, and updated container images.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "VolSync v0.15 is a Kubernetes operator that enables asynchronous\nreplication of persistent volumes within a cluster, or across clusters. After\ndeploying the VolSync operator, it can create and maintain copies of your\npersistent data.\n\nFor more information about VolSync, see:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.16/html/business_continuity/business-cont-overview#volsync\n\nor the VolSync open source community website at: https://volsync.readthedocs.io/en/stable/.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11803",
"url": "https://access.redhat.com/errata/RHSA-2026:11803"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32282",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11803.json"
}
],
"title": "Red Hat Security Advisory: VolSync v0.15 security fixes and container updates",
"tracking": {
"current_release_date": "2026-05-06T12:40:26+00:00",
"generator": {
"date": "2026-05-06T12:40:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:11803",
"initial_release_date": "2026-04-29T15:35:02+00:00",
"revision_history": [
{
"date": "2026-04-29T15:35:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T15:35:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T12:40:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.16",
"product": {
"name": "Red Hat Advanced Cluster Management for Kubernetes 2.16",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.16",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:acm:2.16::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Advanced Cluster Management for Kubernetes"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64",
"product_id": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/volsync-rhel9@sha256%3A74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1777380410"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64",
"product": {
"name": "registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64",
"product_id": "registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64",
"product_identification_helper": {
"purl": "pkg:oci/volsync-operator-bundle@sha256%3A16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1777382754"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le",
"product": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le",
"product_id": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/volsync-rhel9@sha256%3A0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1777380410"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x",
"product": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x",
"product_id": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x",
"product_identification_helper": {
"purl": "pkg:oci/volsync-rhel9@sha256%3Aed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1777380410"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64",
"product": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64",
"product_id": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/volsync-rhel9@sha256%3A035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2\u0026tag=1777380410"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.16",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.16",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64"
},
"product_reference": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.16",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le"
},
"product_reference": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.16",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64"
},
"product_reference": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.16",
"product_id": "Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x"
},
"product_reference": "registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x",
"relates_to_product_reference": "Red Hat Advanced Cluster Management for Kubernetes 2.16"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-32282",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-04-08T02:01:12.683211+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the internal/syscall/unix package in the Go standard library. If the target of the `Root.Chmod` function is replaced with a symbolic link during execution, specifically after `Root.Chmod` checks the target but before acting, the `chmod` operation will be performed on the file the symbolic link points to. This issue can bypass directory restrictions and lead to unauthorized permission changes on the filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs access to the system and the required permissions to create a symbolic link. Additionally, the attacker must swap the target file with a symbolic link in the exact window after the `Root.Chmod` function checks its target but before acting. Due to these conditions, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "RHBZ#2456336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"category": "external",
"summary": "https://go.dev/cl/763761",
"url": "https://go.dev/cl/763761"
},
{
"category": "external",
"summary": "https://go.dev/issue/78293",
"url": "https://go.dev/issue/78293"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4864",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"release_date": "2026-04-08T01:06:55.953000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T15:35:02+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.16/html/business_continuity/business-cont-overview#volsync",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11803"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x"
],
"known_not_affected": [
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T15:35:02+00:00",
"details": "For more details, see the Red Hat Advanced Cluster Management for Kubernetes documentation:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.16/html/business_continuity/business-cont-overview#volsync",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11803"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-operator-bundle@sha256:16fe25978a2667b08c64fdc291cf49f360f734ec4904888f819cc0a563f39b36_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:035aff4df7d0f68580d1592dc48b44af82df171b12de09b5bb7df9842877edcb_arm64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:0a771130ae9933c3458a1f2630b755d039cabac0bd8ff3613080a17b57bbc62e_ppc64le",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:74d79d9a7f8a625cc84c53329e84b30e8de5ae166614cd9417136f0c3d5664e8_amd64",
"Red Hat Advanced Cluster Management for Kubernetes 2.16:registry.redhat.io/rhacm2/volsync-rhel9@sha256:ed5cef307a8d15acef1805e358ef28d844858f5e87c4ea891675b3d9321a6314_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
}
]
}
SUSE-SU-2026:1321-1
Vulnerability from csaf_suse - Published: 2026-04-14 12:40 - Updated: 2026-04-14 12:40| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\n- Update to go1.25.9 (bsc#1244485).\n- CVE-2026-27140: cmd/go: trust layer bypass when using cgo and SWIG (bsc#1261653).\n- CVE-2026-27143: cmd/compile: possible memory corruption after bound check elimination (bsc#1261654).\n- CVE-2026-27144: cmd/compile: no-op interface conversion bypasses overlap checking (bsc#1261655).\n- CVE-2026-32280: crypto/x509: unexpected work during chain building (bsc#1261656).\n- CVE-2026-32281: crypto/x509: inefficient policy validation (bsc#1261657).\n- CVE-2026-32282: os: Root.Chmod can follow symlinks out of the root on Linux (bsc#1261658).\n- CVE-2026-32283: crypto/tls: multiple key update handshake messages can cause connection to deadlock (bsc#1261659).\n- CVE-2026-32288: archive/tar: unbounded allocation when parsing old format GNU sparse map (bsc#1261660).\n- CVE-2026-32289: html/template: JS template literal context incorrectly tracked (bsc#1261661).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1321,SUSE-SLE-Module-Development-Tools-15-SP7-2026-1321,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1321,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1321,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1321,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1321,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1321,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1321,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1321,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1321,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1321,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1321",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1321-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1321-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261321-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1321-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045526.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1261653",
"url": "https://bugzilla.suse.com/1261653"
},
{
"category": "self",
"summary": "SUSE Bug 1261654",
"url": "https://bugzilla.suse.com/1261654"
},
{
"category": "self",
"summary": "SUSE Bug 1261655",
"url": "https://bugzilla.suse.com/1261655"
},
{
"category": "self",
"summary": "SUSE Bug 1261656",
"url": "https://bugzilla.suse.com/1261656"
},
{
"category": "self",
"summary": "SUSE Bug 1261657",
"url": "https://bugzilla.suse.com/1261657"
},
{
"category": "self",
"summary": "SUSE Bug 1261658",
"url": "https://bugzilla.suse.com/1261658"
},
{
"category": "self",
"summary": "SUSE Bug 1261659",
"url": "https://bugzilla.suse.com/1261659"
},
{
"category": "self",
"summary": "SUSE Bug 1261660",
"url": "https://bugzilla.suse.com/1261660"
},
{
"category": "self",
"summary": "SUSE Bug 1261661",
"url": "https://bugzilla.suse.com/1261661"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27143 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32280 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32283 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32288 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32289 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32289/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-04-14T12:40:53Z",
"generator": {
"date": "2026-04-14T12:40:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1321-1",
"initial_release_date": "2026-04-14T12:40:53Z",
"revision_history": [
{
"date": "2026-04-14T12:40:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-150000.1.35.1.aarch64",
"product": {
"name": "go1.25-1.25.9-150000.1.35.1.aarch64",
"product_id": "go1.25-1.25.9-150000.1.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"product_id": "go1.25-doc-1.25.9-150000.1.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.9-150000.1.35.1.aarch64",
"product": {
"name": "go1.25-race-1.25.9-150000.1.35.1.aarch64",
"product_id": "go1.25-race-1.25.9-150000.1.35.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-150000.1.35.1.i586",
"product": {
"name": "go1.25-1.25.9-150000.1.35.1.i586",
"product_id": "go1.25-1.25.9-150000.1.35.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-150000.1.35.1.i586",
"product": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.i586",
"product_id": "go1.25-doc-1.25.9-150000.1.35.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-150000.1.35.1.ppc64le",
"product": {
"name": "go1.25-1.25.9-150000.1.35.1.ppc64le",
"product_id": "go1.25-1.25.9-150000.1.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"product_id": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"product_id": "go1.25-race-1.25.9-150000.1.35.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-150000.1.35.1.s390x",
"product": {
"name": "go1.25-1.25.9-150000.1.35.1.s390x",
"product_id": "go1.25-1.25.9-150000.1.35.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-150000.1.35.1.s390x",
"product": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.s390x",
"product_id": "go1.25-doc-1.25.9-150000.1.35.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.9-150000.1.35.1.s390x",
"product": {
"name": "go1.25-race-1.25.9-150000.1.35.1.s390x",
"product_id": "go1.25-race-1.25.9-150000.1.35.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-150000.1.35.1.x86_64",
"product": {
"name": "go1.25-1.25.9-150000.1.35.1.x86_64",
"product_id": "go1.25-1.25.9-150000.1.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"product_id": "go1.25-doc-1.25.9-150000.1.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"product": {
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"product_id": "go1.25-race-1.25.9-150000.1.35.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-150000.1.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-150000.1.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27140"
}
],
"notes": [
{
"category": "general",
"text": "SWIG file names containing \u0027cgo\u0027 and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27140",
"url": "https://www.suse.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "SUSE Bug 1261653 for CVE-2026-27140",
"url": "https://bugzilla.suse.com/1261653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:40:53Z",
"details": "important"
}
],
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27143"
}
],
"notes": [
{
"category": "general",
"text": "Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27143",
"url": "https://www.suse.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "SUSE Bug 1261654 for CVE-2026-27143",
"url": "https://bugzilla.suse.com/1261654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:40:53Z",
"details": "important"
}
],
"title": "CVE-2026-27143"
},
{
"cve": "CVE-2026-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27144"
}
],
"notes": [
{
"category": "general",
"text": "The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27144",
"url": "https://www.suse.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1261655 for CVE-2026-27144",
"url": "https://bugzilla.suse.com/1261655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:40:53Z",
"details": "moderate"
}
],
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32280"
}
],
"notes": [
{
"category": "general",
"text": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32280",
"url": "https://www.suse.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "SUSE Bug 1261656 for CVE-2026-32280",
"url": "https://bugzilla.suse.com/1261656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:40:53Z",
"details": "important"
}
],
"title": "CVE-2026-32280"
},
{
"cve": "CVE-2026-32281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32281"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32281",
"url": "https://www.suse.com/security/cve/CVE-2026-32281"
},
{
"category": "external",
"summary": "SUSE Bug 1261657 for CVE-2026-32281",
"url": "https://bugzilla.suse.com/1261657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:40:53Z",
"details": "moderate"
}
],
"title": "CVE-2026-32281"
},
{
"cve": "CVE-2026-32282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32282"
}
],
"notes": [
{
"category": "general",
"text": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32282",
"url": "https://www.suse.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "SUSE Bug 1261658 for CVE-2026-32282",
"url": "https://bugzilla.suse.com/1261658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:40:53Z",
"details": "moderate"
}
],
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-32283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32283"
}
],
"notes": [
{
"category": "general",
"text": "If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32283",
"url": "https://www.suse.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "SUSE Bug 1261659 for CVE-2026-32283",
"url": "https://bugzilla.suse.com/1261659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:40:53Z",
"details": "moderate"
}
],
"title": "CVE-2026-32283"
},
{
"cve": "CVE-2026-32288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32288"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the \"old GNU sparse map\" format.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32288",
"url": "https://www.suse.com/security/cve/CVE-2026-32288"
},
{
"category": "external",
"summary": "SUSE Bug 1261660 for CVE-2026-32288",
"url": "https://bugzilla.suse.com/1261660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:40:53Z",
"details": "moderate"
}
],
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-32289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32289"
}
],
"notes": [
{
"category": "general",
"text": "Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied. These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32289",
"url": "https://www.suse.com/security/cve/CVE-2026-32289"
},
{
"category": "external",
"summary": "SUSE Bug 1261661 for CVE-2026-32289",
"url": "https://bugzilla.suse.com/1261661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.9-150000.1.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.9-150000.1.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:40:53Z",
"details": "moderate"
}
],
"title": "CVE-2026-32289"
}
]
}
SUSE-SU-2026:1580-1
Vulnerability from csaf_suse - Published: 2026-04-23 16:38 - Updated: 2026-04-23 16:38| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.26-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.26-openssl fixes the following issues:\n\n- Update to go1.26.2 (bsc#1255111).\n- CVE-2026-27140: cmd/go: trust layer bypass when using cgo and SWIG (bsc#1261653).\n- CVE-2026-27143: cmd/compile: possible memory corruption after bound check elimination (bsc#1261654).\n- CVE-2026-27144: cmd/compile: no-op interface conversion bypasses overlap checking (bsc#1261655).\n- CVE-2026-32280: crypto/x509: unexpected work during chain building (bsc#1261656).\n- CVE-2026-32281: crypto/x509: inefficient policy validation (bsc#1261657).\n- CVE-2026-32282: os: Root.Chmod can follow symlinks out of the root on Linux (bsc#1261658).\n- CVE-2026-32283: crypto/tls: multiple key update handshake messages can cause connection to deadlock (bsc#1261659).\n- CVE-2026-32288: archive/tar: unbounded allocation when parsing old format GNU sparse map (bsc#1261660).\n- CVE-2026-32289: html/template: JS template literal context incorrectly tracked (bsc#1261661).\n- CVE-2026-33810: crypto/x509: excluded DNS constraints not properly applied to wildcard domains (bsc#1261662).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1580,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1580,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1580,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1580,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1580,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1580,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1580,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1580,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1580",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1580-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1580-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261580-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1580-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045927.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255111",
"url": "https://bugzilla.suse.com/1255111"
},
{
"category": "self",
"summary": "SUSE Bug 1261653",
"url": "https://bugzilla.suse.com/1261653"
},
{
"category": "self",
"summary": "SUSE Bug 1261654",
"url": "https://bugzilla.suse.com/1261654"
},
{
"category": "self",
"summary": "SUSE Bug 1261655",
"url": "https://bugzilla.suse.com/1261655"
},
{
"category": "self",
"summary": "SUSE Bug 1261656",
"url": "https://bugzilla.suse.com/1261656"
},
{
"category": "self",
"summary": "SUSE Bug 1261657",
"url": "https://bugzilla.suse.com/1261657"
},
{
"category": "self",
"summary": "SUSE Bug 1261658",
"url": "https://bugzilla.suse.com/1261658"
},
{
"category": "self",
"summary": "SUSE Bug 1261659",
"url": "https://bugzilla.suse.com/1261659"
},
{
"category": "self",
"summary": "SUSE Bug 1261660",
"url": "https://bugzilla.suse.com/1261660"
},
{
"category": "self",
"summary": "SUSE Bug 1261661",
"url": "https://bugzilla.suse.com/1261661"
},
{
"category": "self",
"summary": "SUSE Bug 1261662",
"url": "https://bugzilla.suse.com/1261662"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27143 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32280 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32283 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32288 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32289 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33810 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33810/"
}
],
"title": "Security update for go1.26-openssl",
"tracking": {
"current_release_date": "2026-04-23T16:38:35Z",
"generator": {
"date": "2026-04-23T16:38:35Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1580-1",
"initial_release_date": "2026-04-23T16:38:35Z",
"revision_history": [
{
"date": "2026-04-23T16:38:35Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"product": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"product_id": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"product": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"product_id": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"product": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"product_id": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.2-150000.1.6.1.i586",
"product": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.i586",
"product_id": "go1.26-openssl-1.26.2-150000.1.6.1.i586"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.i586",
"product": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.i586",
"product_id": "go1.26-openssl-doc-1.26.2-150000.1.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"product": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"product_id": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"product": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"product_id": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"product": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"product_id": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"product": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"product_id": "go1.26-openssl-1.26.2-150000.1.6.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"product": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"product_id": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"product": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"product_id": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"product": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"product_id": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"product": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"product_id": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"product": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"product_id": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
},
"product_reference": "go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27140"
}
],
"notes": [
{
"category": "general",
"text": "SWIG file names containing \u0027cgo\u0027 and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27140",
"url": "https://www.suse.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "SUSE Bug 1261653 for CVE-2026-27140",
"url": "https://bugzilla.suse.com/1261653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "important"
}
],
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27143"
}
],
"notes": [
{
"category": "general",
"text": "Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27143",
"url": "https://www.suse.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "SUSE Bug 1261654 for CVE-2026-27143",
"url": "https://bugzilla.suse.com/1261654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "important"
}
],
"title": "CVE-2026-27143"
},
{
"cve": "CVE-2026-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27144"
}
],
"notes": [
{
"category": "general",
"text": "The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27144",
"url": "https://www.suse.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1261655 for CVE-2026-27144",
"url": "https://bugzilla.suse.com/1261655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32280"
}
],
"notes": [
{
"category": "general",
"text": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32280",
"url": "https://www.suse.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "SUSE Bug 1261656 for CVE-2026-32280",
"url": "https://bugzilla.suse.com/1261656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "important"
}
],
"title": "CVE-2026-32280"
},
{
"cve": "CVE-2026-32281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32281"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32281",
"url": "https://www.suse.com/security/cve/CVE-2026-32281"
},
{
"category": "external",
"summary": "SUSE Bug 1261657 for CVE-2026-32281",
"url": "https://bugzilla.suse.com/1261657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-32281"
},
{
"cve": "CVE-2026-32282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32282"
}
],
"notes": [
{
"category": "general",
"text": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32282",
"url": "https://www.suse.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "SUSE Bug 1261658 for CVE-2026-32282",
"url": "https://bugzilla.suse.com/1261658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-32283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32283"
}
],
"notes": [
{
"category": "general",
"text": "If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32283",
"url": "https://www.suse.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "SUSE Bug 1261659 for CVE-2026-32283",
"url": "https://bugzilla.suse.com/1261659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-32283"
},
{
"cve": "CVE-2026-32288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32288"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the \"old GNU sparse map\" format.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32288",
"url": "https://www.suse.com/security/cve/CVE-2026-32288"
},
{
"category": "external",
"summary": "SUSE Bug 1261660 for CVE-2026-32288",
"url": "https://bugzilla.suse.com/1261660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-32289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32289"
}
],
"notes": [
{
"category": "general",
"text": "Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied. These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32289",
"url": "https://www.suse.com/security/cve/CVE-2026-32289"
},
{
"category": "external",
"summary": "SUSE Bug 1261661 for CVE-2026-32289",
"url": "https://bugzilla.suse.com/1261661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-32289"
},
{
"cve": "CVE-2026-33810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33810"
}
],
"notes": [
{
"category": "general",
"text": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33810",
"url": "https://www.suse.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "SUSE Bug 1261662 for CVE-2026-33810",
"url": "https://bugzilla.suse.com/1261662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-doc-1.26.2-150000.1.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-openssl-race-1.26.2-150000.1.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:38:35Z",
"details": "moderate"
}
],
"title": "CVE-2026-33810"
}
]
}
SUSE-SU-2026:1320-1
Vulnerability from csaf_suse - Published: 2026-04-14 12:39 - Updated: 2026-04-14 12:39| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.26",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.26 fixes the following issues:\n\n- Update to go1.26.2 (bsc#1255111).\n- CVE-2026-27140: cmd/go: trust layer bypass when using cgo and SWIG (bsc#1261653).\n- CVE-2026-27143: cmd/compile: possible memory corruption after bound check elimination (bsc#1261654).\n- CVE-2026-27144: cmd/compile: no-op interface conversion bypasses overlap checking (bsc#1261655).\n- CVE-2026-32280: crypto/x509: unexpected work during chain building (bsc#1261656).\n- CVE-2026-32281: crypto/x509: inefficient policy validation (bsc#1261657).\n- CVE-2026-32282: os: Root.Chmod can follow symlinks out of the root on Linux (bsc#1261658).\n- CVE-2026-32283: crypto/tls: multiple key update handshake messages can cause connection to deadlock (bsc#1261659).\n- CVE-2026-32288: archive/tar: unbounded allocation when parsing old format GNU sparse map (bsc#1261660).\n- CVE-2026-32289: html/template: JS template literal context incorrectly tracked (bsc#1261661).\n- CVE-2026-33810: crypto/x509: excluded DNS constraints not properly applied to wildcard domains (bsc#1261662).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1320,SUSE-SLE-Module-Development-Tools-15-SP7-2026-1320,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1320,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1320,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1320,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1320,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1320,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1320,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1320,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1320,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1320,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1320",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1320-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1320-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261320-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1320-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045527.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255111",
"url": "https://bugzilla.suse.com/1255111"
},
{
"category": "self",
"summary": "SUSE Bug 1261653",
"url": "https://bugzilla.suse.com/1261653"
},
{
"category": "self",
"summary": "SUSE Bug 1261654",
"url": "https://bugzilla.suse.com/1261654"
},
{
"category": "self",
"summary": "SUSE Bug 1261655",
"url": "https://bugzilla.suse.com/1261655"
},
{
"category": "self",
"summary": "SUSE Bug 1261656",
"url": "https://bugzilla.suse.com/1261656"
},
{
"category": "self",
"summary": "SUSE Bug 1261657",
"url": "https://bugzilla.suse.com/1261657"
},
{
"category": "self",
"summary": "SUSE Bug 1261658",
"url": "https://bugzilla.suse.com/1261658"
},
{
"category": "self",
"summary": "SUSE Bug 1261659",
"url": "https://bugzilla.suse.com/1261659"
},
{
"category": "self",
"summary": "SUSE Bug 1261660",
"url": "https://bugzilla.suse.com/1261660"
},
{
"category": "self",
"summary": "SUSE Bug 1261661",
"url": "https://bugzilla.suse.com/1261661"
},
{
"category": "self",
"summary": "SUSE Bug 1261662",
"url": "https://bugzilla.suse.com/1261662"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27143 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32280 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32283 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32288 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32289 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33810 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33810/"
}
],
"title": "Security update for go1.26",
"tracking": {
"current_release_date": "2026-04-14T12:39:43Z",
"generator": {
"date": "2026-04-14T12:39:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1320-1",
"initial_release_date": "2026-04-14T12:39:43Z",
"revision_history": [
{
"date": "2026-04-14T12:39:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-150000.1.9.1.aarch64",
"product": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64",
"product_id": "go1.26-1.26.2-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"product": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"product_id": "go1.26-doc-1.26.2-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"product": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"product_id": "go1.26-race-1.26.2-150000.1.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-150000.1.9.1.i586",
"product": {
"name": "go1.26-1.26.2-150000.1.9.1.i586",
"product_id": "go1.26-1.26.2-150000.1.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-150000.1.9.1.i586",
"product": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.i586",
"product_id": "go1.26-doc-1.26.2-150000.1.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"product": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"product_id": "go1.26-1.26.2-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"product": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"product_id": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"product": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"product_id": "go1.26-race-1.26.2-150000.1.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-150000.1.9.1.s390x",
"product": {
"name": "go1.26-1.26.2-150000.1.9.1.s390x",
"product_id": "go1.26-1.26.2-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-150000.1.9.1.s390x",
"product": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.s390x",
"product_id": "go1.26-doc-1.26.2-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-150000.1.9.1.s390x",
"product": {
"name": "go1.26-race-1.26.2-150000.1.9.1.s390x",
"product_id": "go1.26-race-1.26.2-150000.1.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-150000.1.9.1.x86_64",
"product": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64",
"product_id": "go1.26-1.26.2-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"product": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"product_id": "go1.26-doc-1.26.2-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"product": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"product_id": "go1.26-race-1.26.2-150000.1.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27140"
}
],
"notes": [
{
"category": "general",
"text": "SWIG file names containing \u0027cgo\u0027 and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27140",
"url": "https://www.suse.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "SUSE Bug 1261653 for CVE-2026-27140",
"url": "https://bugzilla.suse.com/1261653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "important"
}
],
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27143"
}
],
"notes": [
{
"category": "general",
"text": "Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27143",
"url": "https://www.suse.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "SUSE Bug 1261654 for CVE-2026-27143",
"url": "https://bugzilla.suse.com/1261654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "important"
}
],
"title": "CVE-2026-27143"
},
{
"cve": "CVE-2026-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27144"
}
],
"notes": [
{
"category": "general",
"text": "The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27144",
"url": "https://www.suse.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1261655 for CVE-2026-27144",
"url": "https://bugzilla.suse.com/1261655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32280"
}
],
"notes": [
{
"category": "general",
"text": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32280",
"url": "https://www.suse.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "SUSE Bug 1261656 for CVE-2026-32280",
"url": "https://bugzilla.suse.com/1261656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "important"
}
],
"title": "CVE-2026-32280"
},
{
"cve": "CVE-2026-32281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32281"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32281",
"url": "https://www.suse.com/security/cve/CVE-2026-32281"
},
{
"category": "external",
"summary": "SUSE Bug 1261657 for CVE-2026-32281",
"url": "https://bugzilla.suse.com/1261657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-32281"
},
{
"cve": "CVE-2026-32282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32282"
}
],
"notes": [
{
"category": "general",
"text": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32282",
"url": "https://www.suse.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "SUSE Bug 1261658 for CVE-2026-32282",
"url": "https://bugzilla.suse.com/1261658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-32283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32283"
}
],
"notes": [
{
"category": "general",
"text": "If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32283",
"url": "https://www.suse.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "SUSE Bug 1261659 for CVE-2026-32283",
"url": "https://bugzilla.suse.com/1261659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-32283"
},
{
"cve": "CVE-2026-32288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32288"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the \"old GNU sparse map\" format.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32288",
"url": "https://www.suse.com/security/cve/CVE-2026-32288"
},
{
"category": "external",
"summary": "SUSE Bug 1261660 for CVE-2026-32288",
"url": "https://bugzilla.suse.com/1261660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-32289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32289"
}
],
"notes": [
{
"category": "general",
"text": "Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied. These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32289",
"url": "https://www.suse.com/security/cve/CVE-2026-32289"
},
{
"category": "external",
"summary": "SUSE Bug 1261661 for CVE-2026-32289",
"url": "https://bugzilla.suse.com/1261661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-32289"
},
{
"cve": "CVE-2026-33810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33810"
}
],
"notes": [
{
"category": "general",
"text": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33810",
"url": "https://www.suse.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "SUSE Bug 1261662 for CVE-2026-33810",
"url": "https://bugzilla.suse.com/1261662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.26-race-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-doc-1.26.2-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.26-race-1.26.2-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T12:39:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-33810"
}
]
}
SUSE-SU-2026:21356-1
Vulnerability from csaf_suse - Published: 2026-04-20 14:00 - Updated: 2026-04-20 14:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.26",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.26 fixes the following issues:\n\n- Update to version go1.26.2 (bsc#1255111).\n- CVE-2026-27140: cmd/go: trust layer bypass when using cgo and SWIG (bsc#1261653).\n- CVE-2026-27143: cmd/compile: possible memory corruption after bound check elimination (bsc#1261654).\n- CVE-2026-27144: cmd/compile: no-op interface conversion bypasses overlap checking (bsc#1261655).\n- CVE-2026-32280: crypto/x509: unexpected work during chain building (bsc#1261656).\n- CVE-2026-32281: crypto/x509: inefficient policy validation (bsc#1261657).\n- CVE-2026-32282: os: Root.Chmod can follow symlinks out of the root on Linux (bsc#1261658).\n- CVE-2026-32283: crypto/tls: multiple key update handshake messages can cause connection to deadlock (bsc#1261659).\n- CVE-2026-32288: archive/tar: unbounded allocation when parsing old format GNU sparse map (bsc#1261660).\n- CVE-2026-32289: html/template: JS template literal context incorrectly tracked (bsc#1261661).\n- CVE-2026-33810: crypto/x509: excluded DNS constraints not properly applied to wildcard domains (bsc#1261662).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-595",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21356-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21356-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621356-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21356-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/046085.html"
},
{
"category": "self",
"summary": "SUSE Bug 1255111",
"url": "https://bugzilla.suse.com/1255111"
},
{
"category": "self",
"summary": "SUSE Bug 1261653",
"url": "https://bugzilla.suse.com/1261653"
},
{
"category": "self",
"summary": "SUSE Bug 1261654",
"url": "https://bugzilla.suse.com/1261654"
},
{
"category": "self",
"summary": "SUSE Bug 1261655",
"url": "https://bugzilla.suse.com/1261655"
},
{
"category": "self",
"summary": "SUSE Bug 1261656",
"url": "https://bugzilla.suse.com/1261656"
},
{
"category": "self",
"summary": "SUSE Bug 1261657",
"url": "https://bugzilla.suse.com/1261657"
},
{
"category": "self",
"summary": "SUSE Bug 1261658",
"url": "https://bugzilla.suse.com/1261658"
},
{
"category": "self",
"summary": "SUSE Bug 1261659",
"url": "https://bugzilla.suse.com/1261659"
},
{
"category": "self",
"summary": "SUSE Bug 1261660",
"url": "https://bugzilla.suse.com/1261660"
},
{
"category": "self",
"summary": "SUSE Bug 1261661",
"url": "https://bugzilla.suse.com/1261661"
},
{
"category": "self",
"summary": "SUSE Bug 1261662",
"url": "https://bugzilla.suse.com/1261662"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27143 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32280 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32283 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32288 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32289 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33810 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33810/"
}
],
"title": "Security update for go1.26",
"tracking": {
"current_release_date": "2026-04-20T14:00:06Z",
"generator": {
"date": "2026-04-20T14:00:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21356-1",
"initial_release_date": "2026-04-20T14:00:06Z",
"revision_history": [
{
"date": "2026-04-20T14:00:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-160000.1.1.aarch64",
"product": {
"name": "go1.26-1.26.2-160000.1.1.aarch64",
"product_id": "go1.26-1.26.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-160000.1.1.aarch64",
"product": {
"name": "go1.26-doc-1.26.2-160000.1.1.aarch64",
"product_id": "go1.26-doc-1.26.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-libstd-1.26.2-160000.1.1.aarch64",
"product": {
"name": "go1.26-libstd-1.26.2-160000.1.1.aarch64",
"product_id": "go1.26-libstd-1.26.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-160000.1.1.aarch64",
"product": {
"name": "go1.26-race-1.26.2-160000.1.1.aarch64",
"product_id": "go1.26-race-1.26.2-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-160000.1.1.ppc64le",
"product": {
"name": "go1.26-1.26.2-160000.1.1.ppc64le",
"product_id": "go1.26-1.26.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-160000.1.1.ppc64le",
"product": {
"name": "go1.26-doc-1.26.2-160000.1.1.ppc64le",
"product_id": "go1.26-doc-1.26.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-160000.1.1.ppc64le",
"product": {
"name": "go1.26-race-1.26.2-160000.1.1.ppc64le",
"product_id": "go1.26-race-1.26.2-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-160000.1.1.s390x",
"product": {
"name": "go1.26-1.26.2-160000.1.1.s390x",
"product_id": "go1.26-1.26.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-160000.1.1.s390x",
"product": {
"name": "go1.26-doc-1.26.2-160000.1.1.s390x",
"product_id": "go1.26-doc-1.26.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-160000.1.1.s390x",
"product": {
"name": "go1.26-race-1.26.2-160000.1.1.s390x",
"product_id": "go1.26-race-1.26.2-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.26-1.26.2-160000.1.1.x86_64",
"product": {
"name": "go1.26-1.26.2-160000.1.1.x86_64",
"product_id": "go1.26-1.26.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-doc-1.26.2-160000.1.1.x86_64",
"product": {
"name": "go1.26-doc-1.26.2-160000.1.1.x86_64",
"product_id": "go1.26-doc-1.26.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-libstd-1.26.2-160000.1.1.x86_64",
"product": {
"name": "go1.26-libstd-1.26.2-160000.1.1.x86_64",
"product_id": "go1.26-libstd-1.26.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.26-race-1.26.2-160000.1.1.x86_64",
"product": {
"name": "go1.26-race-1.26.2-160000.1.1.x86_64",
"product_id": "go1.26-race-1.26.2-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x"
},
"product_reference": "go1.26-1.26.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-libstd-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-libstd-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le"
},
"product_reference": "go1.26-1.26.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x"
},
"product_reference": "go1.26-1.26.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-doc-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-doc-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-libstd-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-libstd-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-libstd-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.26-race-1.26.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
},
"product_reference": "go1.26-race-1.26.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27140"
}
],
"notes": [
{
"category": "general",
"text": "SWIG file names containing \u0027cgo\u0027 and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27140",
"url": "https://www.suse.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "SUSE Bug 1261653 for CVE-2026-27140",
"url": "https://bugzilla.suse.com/1261653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "important"
}
],
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27143"
}
],
"notes": [
{
"category": "general",
"text": "Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27143",
"url": "https://www.suse.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "SUSE Bug 1261654 for CVE-2026-27143",
"url": "https://bugzilla.suse.com/1261654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "important"
}
],
"title": "CVE-2026-27143"
},
{
"cve": "CVE-2026-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27144"
}
],
"notes": [
{
"category": "general",
"text": "The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27144",
"url": "https://www.suse.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1261655 for CVE-2026-27144",
"url": "https://bugzilla.suse.com/1261655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32280"
}
],
"notes": [
{
"category": "general",
"text": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32280",
"url": "https://www.suse.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "SUSE Bug 1261656 for CVE-2026-32280",
"url": "https://bugzilla.suse.com/1261656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "important"
}
],
"title": "CVE-2026-32280"
},
{
"cve": "CVE-2026-32281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32281"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32281",
"url": "https://www.suse.com/security/cve/CVE-2026-32281"
},
{
"category": "external",
"summary": "SUSE Bug 1261657 for CVE-2026-32281",
"url": "https://bugzilla.suse.com/1261657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-32281"
},
{
"cve": "CVE-2026-32282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32282"
}
],
"notes": [
{
"category": "general",
"text": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32282",
"url": "https://www.suse.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "SUSE Bug 1261658 for CVE-2026-32282",
"url": "https://bugzilla.suse.com/1261658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-32283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32283"
}
],
"notes": [
{
"category": "general",
"text": "If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32283",
"url": "https://www.suse.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "SUSE Bug 1261659 for CVE-2026-32283",
"url": "https://bugzilla.suse.com/1261659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-32283"
},
{
"cve": "CVE-2026-32288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32288"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the \"old GNU sparse map\" format.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32288",
"url": "https://www.suse.com/security/cve/CVE-2026-32288"
},
{
"category": "external",
"summary": "SUSE Bug 1261660 for CVE-2026-32288",
"url": "https://bugzilla.suse.com/1261660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-32289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32289"
}
],
"notes": [
{
"category": "general",
"text": "Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied. These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32289",
"url": "https://www.suse.com/security/cve/CVE-2026-32289"
},
{
"category": "external",
"summary": "SUSE Bug 1261661 for CVE-2026-32289",
"url": "https://bugzilla.suse.com/1261661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-32289"
},
{
"cve": "CVE-2026-33810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33810"
}
],
"notes": [
{
"category": "general",
"text": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33810",
"url": "https://www.suse.com/security/cve/CVE-2026-33810"
},
{
"category": "external",
"summary": "SUSE Bug 1261662 for CVE-2026-33810",
"url": "https://bugzilla.suse.com/1261662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.26-race-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-doc-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-libstd-1.26.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.26-race-1.26.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T14:00:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-33810"
}
]
}
SUSE-SU-2026:1581-1
Vulnerability from csaf_suse - Published: 2026-04-23 16:39 - Updated: 2026-04-23 16:39| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25-openssl fixes the following issues:\n\n- Update to go1.25.9 (bsc#1244485).\n- CVE-2026-27140: cmd/go: trust layer bypass when using cgo and SWIG (bsc#1261653).\n- CVE-2026-27143: cmd/compile: possible memory corruption after bound check elimination (bsc#1261654).\n- CVE-2026-27144: cmd/compile: no-op interface conversion bypasses overlap checking (bsc#1261655).\n- CVE-2026-32280: crypto/x509: unexpected work during chain building (bsc#1261656).\n- CVE-2026-32281: crypto/x509: inefficient policy validation (bsc#1261657).\n- CVE-2026-32282: os: Root.Chmod can follow symlinks out of the root on Linux (bsc#1261658).\n- CVE-2026-32283: crypto/tls: multiple key update handshake messages can cause connection to deadlock (bsc#1261659).\n- CVE-2026-32288: archive/tar: unbounded allocation when parsing old format GNU sparse map (bsc#1261660).\n- CVE-2026-32289: html/template: JS template literal context incorrectly tracked (bsc#1261661).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1581,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1581,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1581,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1581,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1581,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1581,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1581,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1581,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1581",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1581-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1581-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261581-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1581-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045926.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1261653",
"url": "https://bugzilla.suse.com/1261653"
},
{
"category": "self",
"summary": "SUSE Bug 1261654",
"url": "https://bugzilla.suse.com/1261654"
},
{
"category": "self",
"summary": "SUSE Bug 1261655",
"url": "https://bugzilla.suse.com/1261655"
},
{
"category": "self",
"summary": "SUSE Bug 1261656",
"url": "https://bugzilla.suse.com/1261656"
},
{
"category": "self",
"summary": "SUSE Bug 1261657",
"url": "https://bugzilla.suse.com/1261657"
},
{
"category": "self",
"summary": "SUSE Bug 1261658",
"url": "https://bugzilla.suse.com/1261658"
},
{
"category": "self",
"summary": "SUSE Bug 1261659",
"url": "https://bugzilla.suse.com/1261659"
},
{
"category": "self",
"summary": "SUSE Bug 1261660",
"url": "https://bugzilla.suse.com/1261660"
},
{
"category": "self",
"summary": "SUSE Bug 1261661",
"url": "https://bugzilla.suse.com/1261661"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27143 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32280 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32283 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32288 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32289 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32289/"
}
],
"title": "Security update for go1.25-openssl",
"tracking": {
"current_release_date": "2026-04-23T16:39:19Z",
"generator": {
"date": "2026-04-23T16:39:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1581-1",
"initial_release_date": "2026-04-23T16:39:19Z",
"revision_history": [
{
"date": "2026-04-23T16:39:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"product": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"product_id": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"product": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"product_id": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"product": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"product_id": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.9-150000.1.21.1.i586",
"product": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.i586",
"product_id": "go1.25-openssl-1.25.9-150000.1.21.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.i586",
"product": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.i586",
"product_id": "go1.25-openssl-doc-1.25.9-150000.1.21.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"product": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"product_id": "go1.25-openssl-1.25.9-150000.1.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"product": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"product_id": "go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"product": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"product_id": "go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"product": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"product_id": "go1.25-openssl-1.25.9-150000.1.21.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"product": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"product_id": "go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"product": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"product_id": "go1.25-openssl-race-1.25.9-150000.1.21.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"product": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"product_id": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"product": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"product_id": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"product": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"product_id": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27140"
}
],
"notes": [
{
"category": "general",
"text": "SWIG file names containing \u0027cgo\u0027 and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27140",
"url": "https://www.suse.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "SUSE Bug 1261653 for CVE-2026-27140",
"url": "https://bugzilla.suse.com/1261653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:39:19Z",
"details": "important"
}
],
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27143"
}
],
"notes": [
{
"category": "general",
"text": "Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27143",
"url": "https://www.suse.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "SUSE Bug 1261654 for CVE-2026-27143",
"url": "https://bugzilla.suse.com/1261654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:39:19Z",
"details": "important"
}
],
"title": "CVE-2026-27143"
},
{
"cve": "CVE-2026-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27144"
}
],
"notes": [
{
"category": "general",
"text": "The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27144",
"url": "https://www.suse.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1261655 for CVE-2026-27144",
"url": "https://bugzilla.suse.com/1261655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:39:19Z",
"details": "moderate"
}
],
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32280"
}
],
"notes": [
{
"category": "general",
"text": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32280",
"url": "https://www.suse.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "SUSE Bug 1261656 for CVE-2026-32280",
"url": "https://bugzilla.suse.com/1261656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:39:19Z",
"details": "important"
}
],
"title": "CVE-2026-32280"
},
{
"cve": "CVE-2026-32281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32281"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32281",
"url": "https://www.suse.com/security/cve/CVE-2026-32281"
},
{
"category": "external",
"summary": "SUSE Bug 1261657 for CVE-2026-32281",
"url": "https://bugzilla.suse.com/1261657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:39:19Z",
"details": "moderate"
}
],
"title": "CVE-2026-32281"
},
{
"cve": "CVE-2026-32282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32282"
}
],
"notes": [
{
"category": "general",
"text": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32282",
"url": "https://www.suse.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "SUSE Bug 1261658 for CVE-2026-32282",
"url": "https://bugzilla.suse.com/1261658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:39:19Z",
"details": "moderate"
}
],
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-32283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32283"
}
],
"notes": [
{
"category": "general",
"text": "If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32283",
"url": "https://www.suse.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "SUSE Bug 1261659 for CVE-2026-32283",
"url": "https://bugzilla.suse.com/1261659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:39:19Z",
"details": "moderate"
}
],
"title": "CVE-2026-32283"
},
{
"cve": "CVE-2026-32288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32288"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the \"old GNU sparse map\" format.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32288",
"url": "https://www.suse.com/security/cve/CVE-2026-32288"
},
{
"category": "external",
"summary": "SUSE Bug 1261660 for CVE-2026-32288",
"url": "https://bugzilla.suse.com/1261660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:39:19Z",
"details": "moderate"
}
],
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-32289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32289"
}
],
"notes": [
{
"category": "general",
"text": "Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied. These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32289",
"url": "https://www.suse.com/security/cve/CVE-2026-32289"
},
{
"category": "external",
"summary": "SUSE Bug 1261661 for CVE-2026-32289",
"url": "https://bugzilla.suse.com/1261661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.9-150000.1.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.9-150000.1.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-23T16:39:19Z",
"details": "moderate"
}
],
"title": "CVE-2026-32289"
}
]
}
SUSE-SU-2026:21355-1
Vulnerability from csaf_suse - Published: 2026-04-20 13:54 - Updated: 2026-04-20 13:54| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\n- Update to version go1.25.9 (bsc#1244485).\n- CVE-2026-27140: cmd/go: trust layer bypass when using cgo and SWIG (bsc#1261653).\n- CVE-2026-27143: cmd/compile: possible memory corruption after bound check elimination (bsc#1261654).\n- CVE-2026-27144: cmd/compile: no-op interface conversion bypasses overlap checking (bsc#1261655).\n- CVE-2026-32280: crypto/x509: unexpected work during chain building (bsc#1261656).\n- CVE-2026-32281: crypto/x509: inefficient policy validation (bsc#1261657).\n- CVE-2026-32282: os: Root.Chmod can follow symlinks out of the root on Linux (bsc#1261658).\n- CVE-2026-32283: crypto/tls: multiple key update handshake messages can cause connection to deadlock (bsc#1261659).\n- CVE-2026-32288: archive/tar: unbounded allocation when parsing old format GNU sparse map (bsc#1261660).\n- CVE-2026-32289: html/template: JS template literal context incorrectly tracked (bsc#1261661).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-594",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21355-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21355-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621355-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21355-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/046086.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1261653",
"url": "https://bugzilla.suse.com/1261653"
},
{
"category": "self",
"summary": "SUSE Bug 1261654",
"url": "https://bugzilla.suse.com/1261654"
},
{
"category": "self",
"summary": "SUSE Bug 1261655",
"url": "https://bugzilla.suse.com/1261655"
},
{
"category": "self",
"summary": "SUSE Bug 1261656",
"url": "https://bugzilla.suse.com/1261656"
},
{
"category": "self",
"summary": "SUSE Bug 1261657",
"url": "https://bugzilla.suse.com/1261657"
},
{
"category": "self",
"summary": "SUSE Bug 1261658",
"url": "https://bugzilla.suse.com/1261658"
},
{
"category": "self",
"summary": "SUSE Bug 1261659",
"url": "https://bugzilla.suse.com/1261659"
},
{
"category": "self",
"summary": "SUSE Bug 1261660",
"url": "https://bugzilla.suse.com/1261660"
},
{
"category": "self",
"summary": "SUSE Bug 1261661",
"url": "https://bugzilla.suse.com/1261661"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27143 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32280 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32283 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32288 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32289 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32289/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-04-20T13:54:28Z",
"generator": {
"date": "2026-04-20T13:54:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21355-1",
"initial_release_date": "2026-04-20T13:54:28Z",
"revision_history": [
{
"date": "2026-04-20T13:54:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.9-160000.1.1.aarch64",
"product_id": "go1.25-1.25.9-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.9-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.9-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.9-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.9-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.9-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.9-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.9-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.9-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.9-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.9-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.9-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.9-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.9-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.9-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.9-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.9-160000.1.1.s390x",
"product_id": "go1.25-1.25.9-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.9-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.9-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.9-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.9-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.9-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.9-160000.1.1.x86_64",
"product_id": "go1.25-1.25.9-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.9-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.9-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.9-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.9-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.9-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.9-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.9-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.9-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.9-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.9-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.9-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.9-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.9-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.9-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.9-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.9-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.9-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.9-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.9-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.9-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.9-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.9-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.9-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.9-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.9-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.9-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.9-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.9-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.9-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.9-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.9-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.9-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.9-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.9-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.9-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.9-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27140"
}
],
"notes": [
{
"category": "general",
"text": "SWIG file names containing \u0027cgo\u0027 and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27140",
"url": "https://www.suse.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "SUSE Bug 1261653 for CVE-2026-27140",
"url": "https://bugzilla.suse.com/1261653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T13:54:28Z",
"details": "important"
}
],
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27143"
}
],
"notes": [
{
"category": "general",
"text": "Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27143",
"url": "https://www.suse.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "SUSE Bug 1261654 for CVE-2026-27143",
"url": "https://bugzilla.suse.com/1261654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T13:54:28Z",
"details": "important"
}
],
"title": "CVE-2026-27143"
},
{
"cve": "CVE-2026-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27144"
}
],
"notes": [
{
"category": "general",
"text": "The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27144",
"url": "https://www.suse.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1261655 for CVE-2026-27144",
"url": "https://bugzilla.suse.com/1261655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T13:54:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32280"
}
],
"notes": [
{
"category": "general",
"text": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32280",
"url": "https://www.suse.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "SUSE Bug 1261656 for CVE-2026-32280",
"url": "https://bugzilla.suse.com/1261656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T13:54:28Z",
"details": "important"
}
],
"title": "CVE-2026-32280"
},
{
"cve": "CVE-2026-32281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32281"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32281",
"url": "https://www.suse.com/security/cve/CVE-2026-32281"
},
{
"category": "external",
"summary": "SUSE Bug 1261657 for CVE-2026-32281",
"url": "https://bugzilla.suse.com/1261657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T13:54:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-32281"
},
{
"cve": "CVE-2026-32282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32282"
}
],
"notes": [
{
"category": "general",
"text": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32282",
"url": "https://www.suse.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "SUSE Bug 1261658 for CVE-2026-32282",
"url": "https://bugzilla.suse.com/1261658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T13:54:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-32283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32283"
}
],
"notes": [
{
"category": "general",
"text": "If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32283",
"url": "https://www.suse.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "SUSE Bug 1261659 for CVE-2026-32283",
"url": "https://bugzilla.suse.com/1261659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T13:54:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-32283"
},
{
"cve": "CVE-2026-32288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32288"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the \"old GNU sparse map\" format.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32288",
"url": "https://www.suse.com/security/cve/CVE-2026-32288"
},
{
"category": "external",
"summary": "SUSE Bug 1261660 for CVE-2026-32288",
"url": "https://bugzilla.suse.com/1261660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T13:54:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-32289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32289"
}
],
"notes": [
{
"category": "general",
"text": "Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied. These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32289",
"url": "https://www.suse.com/security/cve/CVE-2026-32289"
},
{
"category": "external",
"summary": "SUSE Bug 1261661 for CVE-2026-32289",
"url": "https://bugzilla.suse.com/1261661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.9-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.9-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T13:54:28Z",
"details": "moderate"
}
],
"title": "CVE-2026-32289"
}
]
}
cleanstart-2026-bm53321
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kube-state-metrics package. An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kube-state-metrics"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.16.0-r3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kube-state-metrics package. An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-BM53321",
"modified": "2026-04-09T11:53:35Z",
"published": "2026-04-10T00:51:58.426076Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-BM53321.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing",
"upstream": [
"CVE-2025-22868",
"CVE-2025-47911",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-58183",
"CVE-2025-58185",
"CVE-2025-58187",
"CVE-2025-58188",
"CVE-2025-58189",
"CVE-2025-58190",
"CVE-2025-61723",
"CVE-2025-61724",
"CVE-2025-61725",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186"
]
}
cleanstart-2026-kt28044
Vulnerability from cleanstart
Multiple security vulnerabilities affect the terragrunt-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "terragrunt-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.97.2-r6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the terragrunt-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-KT28044",
"modified": "2026-04-29T07:43:21Z",
"published": "2026-04-30T01:03:26.906365Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-KT28044.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4660"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3xc5-wrhm-f963"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6g7g-w4f8-9c9x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-92mm-2pjq-r785"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w8rr-5gcm-pp58"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4660"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"CVE-2026-39882",
"CVE-2026-4660",
"ghsa-3xc5-wrhm-f963",
"ghsa-6g7g-w4f8-9c9x",
"ghsa-92mm-2pjq-r785",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-fw7p-63qq-7hpr",
"ghsa-p77j-4mvh-x3m3",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-w8rr-5gcm-pp58",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-mi12470
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opentofu-fips package. Within HostnameError. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opentofu-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.4-r5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opentofu-fips package. Within HostnameError. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-MI12470",
"modified": "2026-04-29T09:05:33Z",
"published": "2026-04-30T00:49:56.616377Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-MI12470.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-78h2-9frx-2jm8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfvc-g4fc-pqhx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jc7w-c686-c4v9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w8rr-5gcm-pp58"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wjrx-6529-hcj3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Within HostnameError",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"CVE-2026-39882",
"CVE-2026-39883",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-6v2p-p543-phr9",
"ghsa-78h2-9frx-2jm8",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-c6gw-w398-hv78",
"ghsa-fv92-fjc5-jj9h",
"ghsa-hcg3-q754-cr77",
"ghsa-hfvc-g4fc-pqhx",
"ghsa-jc7w-c686-c4v9",
"ghsa-mh63-6h87-95cp",
"ghsa-qxp5-gwg8-xv66",
"ghsa-vvgc-356p-c3xw",
"ghsa-w8rr-5gcm-pp58",
"ghsa-wjrx-6529-hcj3",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-ng75665
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kube-state-metrics package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kube-state-metrics"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.16.0-r3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kube-state-metrics package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-NG75665",
"modified": "2026-04-09T11:53:35Z",
"published": "2026-04-10T00:56:28.527348Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-NG75665.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-47911",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-58183",
"CVE-2025-58185",
"CVE-2025-58187",
"CVE-2025-58188",
"CVE-2025-58189",
"CVE-2025-58190",
"CVE-2025-61723",
"CVE-2025-61724",
"CVE-2025-61725",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186"
]
}
cleanstart-2026-hq88036
Vulnerability from cleanstart
Multiple security vulnerabilities affect the terragrunt-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "terragrunt-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.96.1-r4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the terragrunt-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-HQ88036",
"modified": "2026-04-29T07:41:49Z",
"published": "2026-04-30T01:00:58.604637Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-HQ88036.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32285"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4660"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3xc5-wrhm-f963"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6g7g-w4f8-9c9x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-78h2-9frx-2jm8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-92mm-2pjq-r785"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w8rr-5gcm-pp58"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32285"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4660"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32285",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"CVE-2026-39882",
"CVE-2026-4660",
"ghsa-3xc5-wrhm-f963",
"ghsa-6g7g-w4f8-9c9x",
"ghsa-78h2-9frx-2jm8",
"ghsa-92mm-2pjq-r785",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-fw7p-63qq-7hpr",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-w8rr-5gcm-pp58",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-bz28794
Vulnerability from cleanstart
Multiple security vulnerabilities affect the aws-load-balancer-controller package. Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "aws-load-balancer-controller"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.2.1-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the aws-load-balancer-controller package. Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-BZ28794",
"modified": "2026-04-14T10:03:45Z",
"published": "2026-04-15T00:41:09.072733Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-BZ28794.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service",
"upstream": [
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283"
]
}
cleanstart-2026-ng28268
Vulnerability from cleanstart
Multiple security vulnerabilities affect the prometheus package. gRPC-Go is the Go language implementation of gRPC. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "prometheus"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.5.1-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the prometheus package. gRPC-Go is the Go language implementation of gRPC. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-NG28268",
"modified": "2026-04-09T11:52:13Z",
"published": "2026-04-10T00:47:58.418185Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-NG28268.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "gRPC-Go is the Go language implementation of gRPC",
"upstream": [
"CVE-2026-24051",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-39882",
"CVE-2026-39883"
]
}
cleanstart-2026-cn84623
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opentofu-fips package. Within HostnameError. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opentofu-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opentofu-fips package. Within HostnameError. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-CN84623",
"modified": "2026-04-29T09:12:44Z",
"published": "2026-04-30T00:53:26.653377Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-CN84623.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-8912"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-78h2-9frx-2jm8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfvc-g4fc-pqhx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jc7w-c686-c4v9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w8rr-5gcm-pp58"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wjrx-6529-hcj3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8912"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Within HostnameError",
"upstream": [
"CVE-2020-8912",
"CVE-2024-10005",
"CVE-2024-10006",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-24515",
"CVE-2026-25210",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"CVE-2026-39882",
"CVE-2026-39883",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-6v2p-p543-phr9",
"ghsa-78h2-9frx-2jm8",
"ghsa-c6gw-w398-hv78",
"ghsa-fv92-fjc5-jj9h",
"ghsa-hcg3-q754-cr77",
"ghsa-hfvc-g4fc-pqhx",
"ghsa-jc7w-c686-c4v9",
"ghsa-mh63-6h87-95cp",
"ghsa-p77j-4mvh-x3m3",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-qxp5-gwg8-xv66",
"ghsa-vvgc-356p-c3xw",
"ghsa-w8rr-5gcm-pp58",
"ghsa-wjrx-6529-hcj3",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-dm93480
Vulnerability from cleanstart
Multiple security vulnerabilities affect the lvm-driver package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "lvm-driver"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.7.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the lvm-driver package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-DM93480",
"modified": "2026-04-09T09:11:04Z",
"published": "2026-04-10T01:06:00.088585Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DM93480.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33540"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-35172"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33540"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35172"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-22868",
"CVE-2025-47911",
"CVE-2025-58190",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33540",
"CVE-2026-33810",
"CVE-2026-35172"
]
}
cleanstart-2026-ac01087
Vulnerability from cleanstart
Multiple security vulnerabilities affect the gitness package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "gitness"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the gitness package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-AC01087",
"modified": "2026-04-09T09:55:12Z",
"published": "2026-04-10T01:03:59.042951Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-AC01087.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-30153"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33540"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-35172"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4vq8-7jfc-9cvp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vrw8-fxc6-2r93"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30153"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33540"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35172"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-22868",
"CVE-2025-30153",
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68119",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33540",
"CVE-2026-33810",
"CVE-2026-35172",
"ghsa-4vq8-7jfc-9cvp",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-vrw8-fxc6-2r93"
]
}
cleanstart-2026-fh63386
Vulnerability from cleanstart
Multiple security vulnerabilities affect the sealed-secrets package. When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "sealed-secrets"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.35.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the sealed-secrets package. When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-FH63386",
"modified": "2026-04-13T10:06:48Z",
"published": "2026-04-14T00:44:12.807187Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-FH63386.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint",
"upstream": [
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33810"
]
}
cleanstart-2026-jy63371
Vulnerability from cleanstart
Multiple security vulnerabilities affect the prometheus package. The Delete function fails to properly validate offsets when processing malformed JSON input. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "prometheus"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.5.1-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the prometheus package. The Delete function fails to properly validate offsets when processing malformed JSON input. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-JY63371",
"modified": "2026-04-09T11:52:13Z",
"published": "2026-04-10T00:45:58.478015Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-JY63371.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32285"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32285"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Delete function fails to properly validate offsets when processing malformed JSON input",
"upstream": [
"CVE-2026-24051",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32285",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-39882",
"CVE-2026-39883"
]
}
cleanstart-2026-jz43336
Vulnerability from cleanstart
Multiple security vulnerabilities affect the percona-xtradb-cluster-operator package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "percona-xtradb-cluster-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.19.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the percona-xtradb-cluster-operator package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-JZ43336",
"modified": "2026-04-15T09:24:00Z",
"published": "2026-04-16T00:45:49.932786Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-JZ43336.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33810",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x"
]
}
cleanstart-2026-cd13174
Vulnerability from cleanstart
Multiple security vulnerabilities affect the prometheus package. gRPC-Go is the Go language implementation of gRPC. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "prometheus"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.5.1-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the prometheus package. gRPC-Go is the Go language implementation of gRPC. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-CD13174",
"modified": "2026-04-09T11:52:13Z",
"published": "2026-04-10T00:49:58.731115Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-CD13174.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "gRPC-Go is the Go language implementation of gRPC",
"upstream": [
"CVE-2026-24051",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-39882",
"CVE-2026-39883"
]
}
cleanstart-2026-cr55131
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kyverno-policy-reporter-kyverno-plugin-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kyverno-policy-reporter-kyverno-plugin-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.4-r4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kyverno-policy-reporter-kyverno-plugin-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-CR55131",
"modified": "2026-04-15T04:54:42Z",
"published": "2026-04-16T01:01:17.387205Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-CR55131.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33810"
]
}
cleanstart-2026-hz73294
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kube-fluentd-operator package. Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kube-fluentd-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.2-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kube-fluentd-operator package. Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-HZ73294",
"modified": "2026-04-08T10:12:22Z",
"published": "2026-04-09T00:45:08.400884Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-HZ73294.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-45288"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-24786"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-45338"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22869"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22872"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-65637"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4f99-4q7p-p3gh"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4v7x-pqxf-cx7m"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-8r3f-844c-mc37"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-v778-237x-gjrc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22869"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22872"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65637"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service",
"upstream": [
"CVE-2023-45288",
"CVE-2024-24786",
"CVE-2024-45338",
"CVE-2025-22868",
"CVE-2025-22869",
"CVE-2025-22872",
"CVE-2025-47911",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-58190",
"CVE-2025-65637",
"CVE-2026-32281",
"CVE-2026-32282",
"ghsa-4f99-4q7p-p3gh",
"ghsa-4v7x-pqxf-cx7m",
"ghsa-6v2p-p543-phr9",
"ghsa-8r3f-844c-mc37",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-hcg3-q754-cr77",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-qxp5-gwg8-xv66",
"ghsa-v778-237x-gjrc",
"ghsa-vvgc-356p-c3xw"
]
}
cleanstart-2026-gy48351
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opentofu-fips package. Within HostnameError. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opentofu-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opentofu-fips package. Within HostnameError. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-GY48351",
"modified": "2026-04-29T09:10:13Z",
"published": "2026-04-30T00:53:26.601522Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-GY48351.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-8912"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-78h2-9frx-2jm8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfvc-g4fc-pqhx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jc7w-c686-c4v9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w8rr-5gcm-pp58"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wjrx-6529-hcj3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8912"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Within HostnameError",
"upstream": [
"CVE-2020-8912",
"CVE-2024-10005",
"CVE-2024-10006",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-24515",
"CVE-2026-25210",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"CVE-2026-39882",
"CVE-2026-39883",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-6v2p-p543-phr9",
"ghsa-78h2-9frx-2jm8",
"ghsa-c6gw-w398-hv78",
"ghsa-fv92-fjc5-jj9h",
"ghsa-hcg3-q754-cr77",
"ghsa-hfvc-g4fc-pqhx",
"ghsa-jc7w-c686-c4v9",
"ghsa-mh63-6h87-95cp",
"ghsa-p77j-4mvh-x3m3",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-qxp5-gwg8-xv66",
"ghsa-vvgc-356p-c3xw",
"ghsa-w8rr-5gcm-pp58",
"ghsa-wjrx-6529-hcj3",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-nx54250
Vulnerability from cleanstart
Multiple security vulnerabilities affect the gitness package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "gitness"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the gitness package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-NX54250",
"modified": "2026-04-09T09:59:33Z",
"published": "2026-04-10T01:03:29.003448Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-NX54250.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-30153"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33540"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-35172"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4vq8-7jfc-9cvp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vrw8-fxc6-2r93"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30153"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33540"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35172"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-22868",
"CVE-2025-30153",
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68119",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33540",
"CVE-2026-33810",
"CVE-2026-35172",
"ghsa-4vq8-7jfc-9cvp",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-vrw8-fxc6-2r93"
]
}
cleanstart-2026-dr81473
Vulnerability from cleanstart
Multiple security vulnerabilities affect the harbor-scanner-trivy-fips package. HashiCorp’s go-getter library up to v1. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "harbor-scanner-trivy-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.35.1-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the harbor-scanner-trivy-fips package. HashiCorp\u2019s go-getter library up to v1. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-DR81473",
"modified": "2026-04-15T06:15:46Z",
"published": "2026-04-16T00:55:21.838513Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DR81473.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-54410"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4660"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54410"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4660"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "HashiCorp\u2019s go-getter library up to v1",
"upstream": [
"CVE-2025-15558",
"CVE-2025-29923",
"CVE-2025-54410",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33810",
"CVE-2026-39883",
"CVE-2026-4660",
"ghsa-xmrv-pmrh-hhx2"
]
}
cleanstart-2026-bb70412
Vulnerability from cleanstart
Multiple security vulnerabilities affect the percona-xtradb-cluster-operator-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "percona-xtradb-cluster-operator-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-r4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the percona-xtradb-cluster-operator-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-BB70412",
"modified": "2026-04-21T09:28:36Z",
"published": "2026-04-22T00:41:59.291167Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-BB70412.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25518"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-pc3f-x583-g7j2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25518"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-25518",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33810",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-pc3f-x583-g7j2"
]
}
cleanstart-2026-kc83705
Vulnerability from cleanstart
Multiple security vulnerabilities affect the tempo package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "tempo"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the tempo package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-KC83705",
"modified": "2026-04-14T09:04:57Z",
"published": "2026-04-15T00:53:10.163760Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-KC83705.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-11065"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-28377"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32287"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-78h2-9frx-2jm8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-cfpf-hrx2-8rv6"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11065"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28377"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32287"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-11065",
"CVE-2025-22868",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68119",
"CVE-2026-24051",
"CVE-2026-28377",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32287",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"ghsa-2464-8j7c-4cjm",
"ghsa-78h2-9frx-2jm8",
"ghsa-cfpf-hrx2-8rv6",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-fv92-fjc5-jj9h",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-do31246
Vulnerability from cleanstart
Multiple security vulnerabilities affect the terragrunt-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "terragrunt-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.95.1-r4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the terragrunt-fips package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-DO31246",
"modified": "2026-04-29T07:38:43Z",
"published": "2026-04-30T01:04:59.604515Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DO31246.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32285"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4660"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3xc5-wrhm-f963"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6g7g-w4f8-9c9x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-92mm-2pjq-r785"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w8rr-5gcm-pp58"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32285"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39882"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4660"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32285",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-39882",
"CVE-2026-4660",
"ghsa-3xc5-wrhm-f963",
"ghsa-6g7g-w4f8-9c9x",
"ghsa-92mm-2pjq-r785",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-fw7p-63qq-7hpr",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-w8rr-5gcm-pp58"
]
}
cleanstart-2026-lk73694
Vulnerability from cleanstart
Multiple security vulnerabilities affect the sealed-secrets package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "sealed-secrets"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.36.1-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the sealed-secrets package. During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LK73694",
"modified": "2026-04-13T05:21:32Z",
"published": "2026-04-14T00:43:42.897096Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LK73694.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions",
"upstream": [
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33810"
]
}
cleanstart-2026-mp87020
Vulnerability from cleanstart
Multiple security vulnerabilities affect the karpenter package. If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "karpenter"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the karpenter package. If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-MP87020",
"modified": "2026-04-14T11:37:13Z",
"published": "2026-04-15T00:39:08.262212Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-MP87020.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources",
"upstream": [
"CVE-2026-25679",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283"
]
}
cleanstart-2026-fb07695
Vulnerability from cleanstart
Multiple security vulnerabilities affect the velero-fips package. When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "velero-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.17.2-r5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the velero-fips package. When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-FB07695",
"modified": "2026-04-14T11:38:13Z",
"published": "2026-04-15T00:45:38.848496Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-FB07695.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39883"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xmrv-pmrh-hhx2"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32281"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32289"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33810"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-32280",
"CVE-2026-32281",
"CVE-2026-32282",
"CVE-2026-32283",
"CVE-2026-32289",
"CVE-2026-33186",
"CVE-2026-33810",
"CVE-2026-34986",
"CVE-2026-39883",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-xmrv-pmrh-hhx2"
]
}
OPENSUSE-SU-2026:10673-1
Vulnerability from csaf_opensuse - Published: 2026-05-04 00:00 - Updated: 2026-05-04 00:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "coredns-1.14.3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the coredns-1.14.3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10673",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10673-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33190 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33190/"
}
],
"title": "coredns-1.14.3-1.1 on GA media",
"tracking": {
"current_release_date": "2026-05-04T00:00:00Z",
"generator": {
"date": "2026-05-04T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10673-1",
"initial_release_date": "2026-05-04T00:00:00Z",
"revision_history": [
{
"date": "2026-05-04T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "coredns-1.14.3-1.1.aarch64",
"product": {
"name": "coredns-1.14.3-1.1.aarch64",
"product_id": "coredns-1.14.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "coredns-extras-1.14.3-1.1.aarch64",
"product": {
"name": "coredns-extras-1.14.3-1.1.aarch64",
"product_id": "coredns-extras-1.14.3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "coredns-1.14.3-1.1.ppc64le",
"product": {
"name": "coredns-1.14.3-1.1.ppc64le",
"product_id": "coredns-1.14.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "coredns-extras-1.14.3-1.1.ppc64le",
"product": {
"name": "coredns-extras-1.14.3-1.1.ppc64le",
"product_id": "coredns-extras-1.14.3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "coredns-1.14.3-1.1.s390x",
"product": {
"name": "coredns-1.14.3-1.1.s390x",
"product_id": "coredns-1.14.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "coredns-extras-1.14.3-1.1.s390x",
"product": {
"name": "coredns-extras-1.14.3-1.1.s390x",
"product_id": "coredns-extras-1.14.3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "coredns-1.14.3-1.1.x86_64",
"product": {
"name": "coredns-1.14.3-1.1.x86_64",
"product_id": "coredns-1.14.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "coredns-extras-1.14.3-1.1.x86_64",
"product": {
"name": "coredns-extras-1.14.3-1.1.x86_64",
"product_id": "coredns-extras-1.14.3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-1.14.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:coredns-1.14.3-1.1.aarch64"
},
"product_reference": "coredns-1.14.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-1.14.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:coredns-1.14.3-1.1.ppc64le"
},
"product_reference": "coredns-1.14.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-1.14.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:coredns-1.14.3-1.1.s390x"
},
"product_reference": "coredns-1.14.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-1.14.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:coredns-1.14.3-1.1.x86_64"
},
"product_reference": "coredns-1.14.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-extras-1.14.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.aarch64"
},
"product_reference": "coredns-extras-1.14.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-extras-1.14.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.ppc64le"
},
"product_reference": "coredns-extras-1.14.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-extras-1.14.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.s390x"
},
"product_reference": "coredns-extras-1.14.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-extras-1.14.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.x86_64"
},
"product_reference": "coredns-extras-1.14.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27140"
}
],
"notes": [
{
"category": "general",
"text": "SWIG file names containing \u0027cgo\u0027 and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:coredns-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.x86_64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27140",
"url": "https://www.suse.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "SUSE Bug 1261653 for CVE-2026-27140",
"url": "https://bugzilla.suse.com/1261653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:coredns-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.x86_64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:coredns-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.x86_64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27144"
}
],
"notes": [
{
"category": "general",
"text": "The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:coredns-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.x86_64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27144",
"url": "https://www.suse.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1261655 for CVE-2026-27144",
"url": "https://bugzilla.suse.com/1261655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:coredns-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.x86_64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:coredns-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.x86_64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32282"
}
],
"notes": [
{
"category": "general",
"text": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:coredns-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.x86_64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32282",
"url": "https://www.suse.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "SUSE Bug 1261658 for CVE-2026-32282",
"url": "https://bugzilla.suse.com/1261658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:coredns-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.x86_64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:coredns-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.x86_64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-33190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33190"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:coredns-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.x86_64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33190",
"url": "https://www.suse.com/security/cve/CVE-2026-33190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:coredns-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-1.14.3-1.1.x86_64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.aarch64",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.ppc64le",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.s390x",
"openSUSE Tumbleweed:coredns-extras-1.14.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-33190"
}
]
}
OPENSUSE-SU-2026:10514-1
Vulnerability from csaf_opensuse - Published: 2026-04-09 00:00 - Updated: 2026-04-09 00:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.25-1.25.9-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.25-1.25.9-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10514",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10514-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27143 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32280 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32283 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32288 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32289 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32289/"
}
],
"title": "go1.25-1.25.9-1.1 on GA media",
"tracking": {
"current_release_date": "2026-04-09T00:00:00Z",
"generator": {
"date": "2026-04-09T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10514-1",
"initial_release_date": "2026-04-09T00:00:00Z",
"revision_history": [
{
"date": "2026-04-09T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-1.1.aarch64",
"product": {
"name": "go1.25-1.25.9-1.1.aarch64",
"product_id": "go1.25-1.25.9-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.9-1.1.aarch64",
"product_id": "go1.25-doc-1.25.9-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.9-1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.9-1.1.aarch64",
"product_id": "go1.25-libstd-1.25.9-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.9-1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.9-1.1.aarch64",
"product_id": "go1.25-race-1.25.9-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-1.1.ppc64le",
"product": {
"name": "go1.25-1.25.9-1.1.ppc64le",
"product_id": "go1.25-1.25.9-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.9-1.1.ppc64le",
"product_id": "go1.25-doc-1.25.9-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.9-1.1.ppc64le",
"product": {
"name": "go1.25-libstd-1.25.9-1.1.ppc64le",
"product_id": "go1.25-libstd-1.25.9-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.9-1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.9-1.1.ppc64le",
"product_id": "go1.25-race-1.25.9-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-1.1.s390x",
"product": {
"name": "go1.25-1.25.9-1.1.s390x",
"product_id": "go1.25-1.25.9-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.9-1.1.s390x",
"product_id": "go1.25-doc-1.25.9-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.9-1.1.s390x",
"product": {
"name": "go1.25-libstd-1.25.9-1.1.s390x",
"product_id": "go1.25-libstd-1.25.9-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.9-1.1.s390x",
"product": {
"name": "go1.25-race-1.25.9-1.1.s390x",
"product_id": "go1.25-race-1.25.9-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.9-1.1.x86_64",
"product": {
"name": "go1.25-1.25.9-1.1.x86_64",
"product_id": "go1.25-1.25.9-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.9-1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.9-1.1.x86_64",
"product_id": "go1.25-doc-1.25.9-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.9-1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.9-1.1.x86_64",
"product_id": "go1.25-libstd-1.25.9-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.9-1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.9-1.1.x86_64",
"product_id": "go1.25-race-1.25.9-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64"
},
"product_reference": "go1.25-1.25.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le"
},
"product_reference": "go1.25-1.25.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x"
},
"product_reference": "go1.25-1.25.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64"
},
"product_reference": "go1.25-1.25.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le"
},
"product_reference": "go1.25-libstd-1.25.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x"
},
"product_reference": "go1.25-libstd-1.25.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x"
},
"product_reference": "go1.25-race-1.25.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27140"
}
],
"notes": [
{
"category": "general",
"text": "SWIG file names containing \u0027cgo\u0027 and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27140",
"url": "https://www.suse.com/security/cve/CVE-2026-27140"
},
{
"category": "external",
"summary": "SUSE Bug 1261653 for CVE-2026-27140",
"url": "https://bugzilla.suse.com/1261653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27143"
}
],
"notes": [
{
"category": "general",
"text": "Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27143",
"url": "https://www.suse.com/security/cve/CVE-2026-27143"
},
{
"category": "external",
"summary": "SUSE Bug 1261654 for CVE-2026-27143",
"url": "https://bugzilla.suse.com/1261654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-27143"
},
{
"cve": "CVE-2026-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-27144"
}
],
"notes": [
{
"category": "general",
"text": "The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-27144",
"url": "https://www.suse.com/security/cve/CVE-2026-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1261655 for CVE-2026-27144",
"url": "https://bugzilla.suse.com/1261655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32280"
}
],
"notes": [
{
"category": "general",
"text": "During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32280",
"url": "https://www.suse.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "SUSE Bug 1261656 for CVE-2026-32280",
"url": "https://bugzilla.suse.com/1261656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-32280"
},
{
"cve": "CVE-2026-32281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32281"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32281",
"url": "https://www.suse.com/security/cve/CVE-2026-32281"
},
{
"category": "external",
"summary": "SUSE Bug 1261657 for CVE-2026-32281",
"url": "https://bugzilla.suse.com/1261657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-32281"
},
{
"cve": "CVE-2026-32282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32282"
}
],
"notes": [
{
"category": "general",
"text": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32282",
"url": "https://www.suse.com/security/cve/CVE-2026-32282"
},
{
"category": "external",
"summary": "SUSE Bug 1261658 for CVE-2026-32282",
"url": "https://bugzilla.suse.com/1261658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-32283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32283"
}
],
"notes": [
{
"category": "general",
"text": "If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32283",
"url": "https://www.suse.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "SUSE Bug 1261659 for CVE-2026-32283",
"url": "https://bugzilla.suse.com/1261659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-32283"
},
{
"cve": "CVE-2026-32288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32288"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the \"old GNU sparse map\" format.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32288",
"url": "https://www.suse.com/security/cve/CVE-2026-32288"
},
{
"category": "external",
"summary": "SUSE Bug 1261660 for CVE-2026-32288",
"url": "https://bugzilla.suse.com/1261660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-32289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32289"
}
],
"notes": [
{
"category": "general",
"text": "Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied. These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32289",
"url": "https://www.suse.com/security/cve/CVE-2026-32289"
},
{
"category": "external",
"summary": "SUSE Bug 1261661 for CVE-2026-32289",
"url": "https://bugzilla.suse.com/1261661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.9-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-09T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-32289"
}
]
}
MSRC_CVE-2026-32282
Vulnerability from csaf_microsoft - Published: 2026-04-02 00:00 - Updated: 2026-04-15 01:48| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-32282 TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-32282.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix",
"tracking": {
"current_release_date": "2026-04-15T01:48:20.000Z",
"generator": {
"date": "2026-04-15T07:32:45.880Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-32282",
"initial_release_date": "2026-04-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-04-11T01:09:15.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-04-14T14:46:24.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-04-15T01:48:20.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 golang 1.25.9-1",
"product": {
"name": "azl3 golang 1.25.9-1",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "cbl2 golang 1.18.8-10",
"product": {
"name": "cbl2 golang 1.18.8-10",
"product_id": "7"
}
},
{
"category": "product_version_range",
"name": "cbl2 golang 1.22.7-5",
"product": {
"name": "cbl2 golang 1.22.7-5",
"product_id": "8"
}
},
{
"category": "product_version_range",
"name": "azl3 golang 1.25.8-1",
"product": {
"name": "azl3 golang 1.25.8-1",
"product_id": "5"
}
},
{
"category": "product_version_range",
"name": "azl3 golang 1.26.1-1",
"product": {
"name": "azl3 golang 1.26.1-1",
"product_id": "4"
}
},
{
"category": "product_version_range",
"name": "azl3 golang 1.26.2-1",
"product": {
"name": "azl3 golang 1.26.2-1",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "golang"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 msft-golang 1.25.8-1",
"product": {
"name": "cbl2 msft-golang 1.25.8-1",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "msft-golang"
},
{
"category": "product_name",
"name": "cbl2 python-tensorboard 2.11.0-3",
"product": {
"name": "cbl2 python-tensorboard 2.11.0-3",
"product_id": "9"
}
},
{
"category": "product_name",
"name": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "azl3 python-tensorboard 2.16.2-6",
"product_id": "10"
}
},
{
"category": "product_name",
"name": "cbl2 tensorflow 2.11.1-2",
"product": {
"name": "cbl2 tensorflow 2.11.1-2",
"product_id": "11"
}
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-11",
"product": {
"name": "azl3 tensorflow 2.16.1-11",
"product_id": "6"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.25.9-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 golang 1.18.8-10 as a component of CBL Mariner 2.0",
"product_id": "17086-7"
},
"product_reference": "7",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 golang 1.22.7-5 as a component of CBL Mariner 2.0",
"product_id": "17086-8"
},
"product_reference": "8",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.25.8-1 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.26.1-1 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 msft-golang 1.25.8-1 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python-tensorboard 2.11.0-3 as a component of CBL Mariner 2.0",
"product_id": "17086-9"
},
"product_reference": "9",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-tensorboard 2.16.2-6 as a component of Azure Linux 3.0",
"product_id": "17084-10"
},
"product_reference": "10",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 tensorflow 2.11.1-2 as a component of CBL Mariner 2.0",
"product_id": "17086-11"
},
"product_reference": "11",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-11 as a component of Azure Linux 3.0",
"product_id": "17084-6"
},
"product_reference": "6",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.26.2-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-32282",
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17086-9",
"17084-10",
"17086-11",
"17084-6"
]
}
],
"notes": [
{
"category": "general",
"text": "Go",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17084-2",
"17086-7",
"17086-8",
"17084-5",
"17084-4",
"17086-3",
"17084-1"
],
"known_not_affected": [
"17086-9",
"17084-10",
"17086-11",
"17084-6"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-32282 TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-32282.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-04-11T01:09:15.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-2"
]
},
{
"category": "none_available",
"date": "2026-04-11T01:09:15.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-7"
]
},
{
"category": "none_available",
"date": "2026-04-11T01:09:15.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-8"
]
},
{
"category": "none_available",
"date": "2026-04-11T01:09:15.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-5"
]
},
{
"category": "none_available",
"date": "2026-04-11T01:09:15.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-4"
]
},
{
"category": "none_available",
"date": "2026-04-11T01:09:15.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-3"
]
},
{
"category": "none_available",
"date": "2026-04-11T01:09:15.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-1"
]
}
],
"title": "TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix"
}
]
}
WID-SEC-W-2026-1006
Vulnerability from csaf_certbund - Published: 2026-04-07 22:00 - Updated: 2026-04-09 22:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um Speicherbesch\u00e4digungen zu verursachen, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand auszul\u00f6sen oder andere, nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1006 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1006.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1006 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1006"
},
{
"category": "external",
"summary": "Go 1.26.2 and Go 1.25.9 releases vom 2026-04-07",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-09T22:00:00.000+00:00",
"generator": {
"date": "2026-04-10T07:05:07.518+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-1006",
"initial_release_date": "2026-04-07T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-04-07T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: 2456336"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.26.2",
"product": {
"name": "Golang Go \u003c1.26.2",
"product_id": "T052518"
}
},
{
"category": "product_version",
"name": "1.26.2",
"product": {
"name": "Golang Go 1.26.2",
"product_id": "T052518-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.26.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.25.9",
"product": {
"name": "Golang Go \u003c1.25.9",
"product_id": "T052519"
}
},
{
"category": "product_version",
"name": "1.25.9",
"product": {
"name": "Golang Go 1.25.9",
"product_id": "T052519-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.25.9"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-27140",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-27140"
},
{
"cve": "CVE-2026-27143",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-27143"
},
{
"cve": "CVE-2026-27144",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-27144"
},
{
"cve": "CVE-2026-32280",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-32280"
},
{
"cve": "CVE-2026-32281",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-32281"
},
{
"cve": "CVE-2026-32282",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-32282"
},
{
"cve": "CVE-2026-32283",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-32283"
},
{
"cve": "CVE-2026-32288",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-32289",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-32289"
},
{
"cve": "CVE-2026-33810",
"product_status": {
"known_affected": [
"T052519",
"T052518"
]
},
"release_date": "2026-04-07T22:00:00.000+00:00",
"title": "CVE-2026-33810"
}
]
}
bit-golang-2026-32282
Vulnerability from bitnami_vulndb
On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "golang",
"purl": "pkg:bitnami/golang"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.25.9"
},
{
"introduced": "1.26.0-0"
},
{
"fixed": "1.26.2"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2026-32282"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
],
"severity": "Medium"
},
"details": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"id": "BIT-golang-2026-32282",
"modified": "2026-04-17T00:10:47.507Z",
"published": "2026-04-13T05:43:42.625Z",
"references": [
{
"type": "WEB",
"url": "https://go.dev/cl/763761"
},
{
"type": "WEB",
"url": "https://go.dev/issue/78293"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"schema_version": "1.6.2",
"summary": "TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix"
}
CERTFR-2026-AVI-0498
Vulnerability from certfr_avis - Published: 2026-04-27 - Updated: 2026-04-27
De multiples vulnérabilités ont été découvertes dans Zabbix Agent2. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Zabbix agent2 versions 7.4.8 et 7.4.9 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Agent",
"vendor": {
"name": "Zabbix",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2026-32288",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32288"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2026-27143",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27143"
},
{
"name": "CVE-2026-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27144"
},
{
"name": "CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2026-32281",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32281"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-32289",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32289"
},
{
"name": "CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2026-27140",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27140"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
}
],
"initial_release_date": "2026-04-27T00:00:00",
"last_revision_date": "2026-04-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0498",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Zabbix Agent2. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Zabbix Agent2",
"vendor_advisories": [
{
"published_at": "2026-04-24",
"title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-27738",
"url": "https://support.zabbix.com/browse/ZBX-27738"
}
]
}
FKIE_CVE-2026-32282
Vulnerability from fkie_nvd - Published: 2026-04-08 02:16 - Updated: 2026-04-16 19:156.4 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| security@golang.org | https://go.dev/cl/763761 | Patch | |
| security@golang.org | https://go.dev/issue/78293 | Issue Tracking | |
| security@golang.org | https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU | Release Notes, Mailing List | |
| security@golang.org | https://pkg.go.dev/vuln/GO-2026-4864 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C9C072-9817-402D-877F-F83584B07017",
"versionEndExcluding": "1.25.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39FE9BAF-55E9-43AA-B14E-239E7EF1D65D",
"versionEndExcluding": "1.26.2",
"versionStartIncluding": "1.26.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation."
}
],
"id": "CVE-2026-32282",
"lastModified": "2026-04-16T19:15:39.400",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-04-08T02:16:03.467",
"references": [
{
"source": "security@golang.org",
"tags": [
"Patch"
],
"url": "https://go.dev/cl/763761"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking"
],
"url": "https://go.dev/issue/78293"
},
{
"source": "security@golang.org",
"tags": [
"Release Notes",
"Mailing List"
],
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-59"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-XJ38-JXC5-RPPX
Vulnerability from github – Published: 2026-04-08 03:32 – Updated: 2026-04-13 21:30On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.
{
"affected": [],
"aliases": [
"CVE-2026-32282"
],
"database_specific": {
"cwe_ids": [
"CWE-59"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-08T02:16:03Z",
"severity": "MODERATE"
},
"details": "On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.",
"id": "GHSA-xj38-jxc5-rppx",
"modified": "2026-04-13T21:30:33Z",
"published": "2026-04-08T03:32:14Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32282"
},
{
"type": "WEB",
"url": "https://go.dev/cl/763761"
},
{
"type": "WEB",
"url": "https://go.dev/issue/78293"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2026-4864"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.