Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-47913 (GCVE-0-2025-47913)
Vulnerability from cvelistv5 – Published: 2025-11-13 21:29 – Updated: 2025-11-13 21:47
VLAI?
EPSS
Summary
SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.
Severity ?
7.5 (High)
CWE
- CWE-703 - Improper Handling of Exceptional Conditions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| golang.org/x/crypto | golang.org/x/crypto/ssh/agent |
Affected:
0 , < 0.43.0
(semver)
|
Credits
Jakub Ciolek
Nicola Murino
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-47913",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-13T21:47:44.206349Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-13T21:47:50.864Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "golang.org/x/crypto/ssh/agent",
"product": "golang.org/x/crypto/ssh/agent",
"programRoutines": [
{
"name": "client.SignWithFlags"
},
{
"name": "client.List"
},
{
"name": "agentKeyringSigner.Sign"
},
{
"name": "agentKeyringSigner.SignWithAlgorithm"
},
{
"name": "client.Sign"
},
{
"name": "client.Signers"
}
],
"vendor": "golang.org/x/crypto",
"versions": [
{
"lessThan": "0.43.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Jakub Ciolek"
},
{
"lang": "en",
"value": "Nicola Murino"
}
],
"descriptions": [
{
"lang": "en",
"value": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-703: Improper Handling of Exceptional Conditions",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-13T21:29:39.907Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://go.dev/cl/700295"
},
{
"url": "https://go.dev/issue/75178"
},
{
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"title": "Potential denial of service in golang.org/x/crypto/ssh/agent"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2025-47913",
"datePublished": "2025-11-13T21:29:39.907Z",
"dateReserved": "2025-05-13T23:31:29.597Z",
"dateUpdated": "2025-11-13T21:47:50.864Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-47913\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2025-11-13T22:15:51.280\",\"lastModified\":\"2025-11-14T16:42:03.187\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"references\":[{\"url\":\"https://github.com/advisories/GHSA-hcg3-q754-cr77\",\"source\":\"security@golang.org\"},{\"url\":\"https://go.dev/cl/700295\",\"source\":\"security@golang.org\"},{\"url\":\"https://go.dev/issue/75178\",\"source\":\"security@golang.org\"},{\"url\":\"https://pkg.go.dev/vuln/GO-2025-4116\",\"source\":\"security@golang.org\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-47913\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-11-13T21:47:44.206349Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-11-13T21:47:40.788Z\"}}], \"cna\": {\"title\": \"Potential denial of service in golang.org/x/crypto/ssh/agent\", \"credits\": [{\"lang\": \"en\", \"value\": \"Jakub Ciolek\"}, {\"lang\": \"en\", \"value\": \"Nicola Murino\"}], \"affected\": [{\"vendor\": \"golang.org/x/crypto\", \"product\": \"golang.org/x/crypto/ssh/agent\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"0.43.0\", \"versionType\": \"semver\"}], \"packageName\": \"golang.org/x/crypto/ssh/agent\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"client.SignWithFlags\"}, {\"name\": \"client.List\"}, {\"name\": \"agentKeyringSigner.Sign\"}, {\"name\": \"agentKeyringSigner.SignWithAlgorithm\"}, {\"name\": \"client.Sign\"}, {\"name\": \"client.Signers\"}]}], \"references\": [{\"url\": \"https://go.dev/cl/700295\"}, {\"url\": \"https://go.dev/issue/75178\"}, {\"url\": \"https://github.com/advisories/GHSA-hcg3-q754-cr77\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2025-4116\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-703: Improper Handling of Exceptional Conditions\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2025-11-13T21:29:39.907Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-47913\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-13T21:47:50.864Z\", \"dateReserved\": \"2025-05-13T23:31:29.597Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2025-11-13T21:29:39.907Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
SUSE-SU-2025:4157-1
Vulnerability from csaf_suse - Published: 2025-11-21 14:30 - Updated: 2025-11-21 14:30Summary
Security update for podman
Notes
Title of the patch
Security update for podman
Description of the patch
This update for podman fixes the following issues:
- CVE-2025-47913: golang.org/x/crypto/ssh/agent: Fixed client process termination when receiving an unexpected message type in response to a key listing or signing request (bsc#1253542)
Patchnames
SUSE-2025-4157,SUSE-SLE-Micro-5.3-2025-4157,SUSE-SLE-Micro-5.4-2025-4157,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4157,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4157,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4157,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4157
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for podman",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for podman fixes the following issues:\n\n- CVE-2025-47913: golang.org/x/crypto/ssh/agent: Fixed client process termination when receiving an unexpected message type in response to a key listing or signing request (bsc#1253542)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4157,SUSE-SLE-Micro-5.3-2025-4157,SUSE-SLE-Micro-5.4-2025-4157,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4157,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4157,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4157,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4157",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4157-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4157-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254157-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4157-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023313.html"
},
{
"category": "self",
"summary": "SUSE Bug 1253542",
"url": "https://bugzilla.suse.com/1253542"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47913/"
}
],
"title": "Security update for podman",
"tracking": {
"current_release_date": "2025-11-21T14:30:17Z",
"generator": {
"date": "2025-11-21T14:30:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4157-1",
"initial_release_date": "2025-11-21T14:30:17Z",
"revision_history": [
{
"date": "2025-11-21T14:30:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150400.4.62.1.aarch64",
"product": {
"name": "podman-4.9.5-150400.4.62.1.aarch64",
"product_id": "podman-4.9.5-150400.4.62.1.aarch64"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150400.4.62.1.aarch64",
"product": {
"name": "podman-remote-4.9.5-150400.4.62.1.aarch64",
"product_id": "podman-remote-4.9.5-150400.4.62.1.aarch64"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150400.4.62.1.aarch64",
"product": {
"name": "podmansh-4.9.5-150400.4.62.1.aarch64",
"product_id": "podmansh-4.9.5-150400.4.62.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150400.4.62.1.i586",
"product": {
"name": "podman-4.9.5-150400.4.62.1.i586",
"product_id": "podman-4.9.5-150400.4.62.1.i586"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150400.4.62.1.i586",
"product": {
"name": "podman-remote-4.9.5-150400.4.62.1.i586",
"product_id": "podman-remote-4.9.5-150400.4.62.1.i586"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150400.4.62.1.i586",
"product": {
"name": "podmansh-4.9.5-150400.4.62.1.i586",
"product_id": "podmansh-4.9.5-150400.4.62.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-4.9.5-150400.4.62.1.noarch",
"product": {
"name": "podman-docker-4.9.5-150400.4.62.1.noarch",
"product_id": "podman-docker-4.9.5-150400.4.62.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150400.4.62.1.ppc64le",
"product": {
"name": "podman-4.9.5-150400.4.62.1.ppc64le",
"product_id": "podman-4.9.5-150400.4.62.1.ppc64le"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150400.4.62.1.ppc64le",
"product": {
"name": "podman-remote-4.9.5-150400.4.62.1.ppc64le",
"product_id": "podman-remote-4.9.5-150400.4.62.1.ppc64le"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150400.4.62.1.ppc64le",
"product": {
"name": "podmansh-4.9.5-150400.4.62.1.ppc64le",
"product_id": "podmansh-4.9.5-150400.4.62.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150400.4.62.1.s390x",
"product": {
"name": "podman-4.9.5-150400.4.62.1.s390x",
"product_id": "podman-4.9.5-150400.4.62.1.s390x"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150400.4.62.1.s390x",
"product": {
"name": "podman-remote-4.9.5-150400.4.62.1.s390x",
"product_id": "podman-remote-4.9.5-150400.4.62.1.s390x"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150400.4.62.1.s390x",
"product": {
"name": "podmansh-4.9.5-150400.4.62.1.s390x",
"product_id": "podmansh-4.9.5-150400.4.62.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150400.4.62.1.x86_64",
"product": {
"name": "podman-4.9.5-150400.4.62.1.x86_64",
"product_id": "podman-4.9.5-150400.4.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150400.4.62.1.x86_64",
"product": {
"name": "podman-remote-4.9.5-150400.4.62.1.x86_64",
"product_id": "podman-remote-4.9.5-150400.4.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150400.4.62.1.x86_64",
"product": {
"name": "podmansh-4.9.5-150400.4.62.1.x86_64",
"product_id": "podmansh-4.9.5-150400.4.62.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:podman-4.9.5-150400.4.62.1.aarch64"
},
"product_reference": "podman-4.9.5-150400.4.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:podman-4.9.5-150400.4.62.1.s390x"
},
"product_reference": "podman-4.9.5-150400.4.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:podman-4.9.5-150400.4.62.1.x86_64"
},
"product_reference": "podman-4.9.5-150400.4.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:podman-remote-4.9.5-150400.4.62.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:podman-remote-4.9.5-150400.4.62.1.s390x"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:podman-remote-4.9.5-150400.4.62.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:podman-4.9.5-150400.4.62.1.aarch64"
},
"product_reference": "podman-4.9.5-150400.4.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:podman-4.9.5-150400.4.62.1.s390x"
},
"product_reference": "podman-4.9.5-150400.4.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:podman-4.9.5-150400.4.62.1.x86_64"
},
"product_reference": "podman-4.9.5-150400.4.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:podman-remote-4.9.5-150400.4.62.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:podman-remote-4.9.5-150400.4.62.1.s390x"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:podman-remote-4.9.5-150400.4.62.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-4.9.5-150400.4.62.1.aarch64"
},
"product_reference": "podman-4.9.5-150400.4.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-4.9.5-150400.4.62.1.x86_64"
},
"product_reference": "podman-4.9.5-150400.4.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.9.5-150400.4.62.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-docker-4.9.5-150400.4.62.1.noarch"
},
"product_reference": "podman-docker-4.9.5-150400.4.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-remote-4.9.5-150400.4.62.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-remote-4.9.5-150400.4.62.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.aarch64"
},
"product_reference": "podman-4.9.5-150400.4.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.x86_64"
},
"product_reference": "podman-4.9.5-150400.4.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.9.5-150400.4.62.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-docker-4.9.5-150400.4.62.1.noarch"
},
"product_reference": "podman-docker-4.9.5-150400.4.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.aarch64"
},
"product_reference": "podman-4.9.5-150400.4.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.ppc64le"
},
"product_reference": "podman-4.9.5-150400.4.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.s390x"
},
"product_reference": "podman-4.9.5-150400.4.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.x86_64"
},
"product_reference": "podman-4.9.5-150400.4.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.9.5-150400.4.62.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:podman-docker-4.9.5-150400.4.62.1.noarch"
},
"product_reference": "podman-docker-4.9.5-150400.4.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.ppc64le"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.s390x"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-4.9.5-150400.4.62.1.ppc64le"
},
"product_reference": "podman-4.9.5-150400.4.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-4.9.5-150400.4.62.1.x86_64"
},
"product_reference": "podman-4.9.5-150400.4.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.9.5-150400.4.62.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-docker-4.9.5-150400.4.62.1.noarch"
},
"product_reference": "podman-docker-4.9.5-150400.4.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-remote-4.9.5-150400.4.62.1.ppc64le"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-remote-4.9.5-150400.4.62.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150400.4.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47913"
}
],
"notes": [
{
"category": "general",
"text": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-docker-4.9.5-150400.4.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-docker-4.9.5-150400.4.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:podman-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Micro 5.3:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:podman-remote-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Micro 5.3:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:podman-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Micro 5.4:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:podman-remote-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Micro 5.4:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-docker-4.9.5-150400.4.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-4.9.5-150400.4.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-docker-4.9.5-150400.4.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-remote-4.9.5-150400.4.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-remote-4.9.5-150400.4.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47913",
"url": "https://www.suse.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "SUSE Bug 1253506 for CVE-2025-47913",
"url": "https://bugzilla.suse.com/1253506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-docker-4.9.5-150400.4.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-docker-4.9.5-150400.4.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:podman-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Micro 5.3:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:podman-remote-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Micro 5.3:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:podman-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Micro 5.4:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:podman-remote-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Micro 5.4:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-docker-4.9.5-150400.4.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-4.9.5-150400.4.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-docker-4.9.5-150400.4.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-remote-4.9.5-150400.4.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-remote-4.9.5-150400.4.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-docker-4.9.5-150400.4.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-docker-4.9.5-150400.4.62.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:podman-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Micro 5.3:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:podman-remote-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Micro 5.3:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:podman-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Micro 5.4:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:podman-remote-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Micro 5.4:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-docker-4.9.5-150400.4.62.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:podman-remote-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-4.9.5-150400.4.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-4.9.5-150400.4.62.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-docker-4.9.5-150400.4.62.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-remote-4.9.5-150400.4.62.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:podman-remote-4.9.5-150400.4.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T14:30:17Z",
"details": "important"
}
],
"title": "CVE-2025-47913"
}
]
}
SUSE-SU-2025:4191-1
Vulnerability from csaf_suse - Published: 2025-11-24 09:22 - Updated: 2025-11-24 09:22Summary
Security update for amazon-ssm-agent
Notes
Title of the patch
Security update for amazon-ssm-agent
Description of the patch
This update for amazon-ssm-agent fixes the following issues:
- CVE-2025-47913: Fixed a bug in the client process termination when receiving an unexpected message type in response to a key listing or signing request. (bsc#1253598)
Patchnames
SUSE-2025-4191,SUSE-SLE-Module-Public-Cloud-15-SP3-2025-4191,SUSE-SLE-Module-Public-Cloud-15-SP4-2025-4191,SUSE-SLE-Module-Public-Cloud-15-SP5-2025-4191,SUSE-SLE-Module-Public-Cloud-15-SP6-2025-4191,SUSE-SLE-Module-Public-Cloud-15-SP7-2025-4191,openSUSE-SLE-15.6-2025-4191
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for amazon-ssm-agent",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for amazon-ssm-agent fixes the following issues:\n\n- CVE-2025-47913: Fixed a bug in the client process termination when receiving an unexpected message type in response to a key listing or signing request. (bsc#1253598)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4191,SUSE-SLE-Module-Public-Cloud-15-SP3-2025-4191,SUSE-SLE-Module-Public-Cloud-15-SP4-2025-4191,SUSE-SLE-Module-Public-Cloud-15-SP5-2025-4191,SUSE-SLE-Module-Public-Cloud-15-SP6-2025-4191,SUSE-SLE-Module-Public-Cloud-15-SP7-2025-4191,openSUSE-SLE-15.6-2025-4191",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4191-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4191-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254191-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4191-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023338.html"
},
{
"category": "self",
"summary": "SUSE Bug 1253611",
"url": "https://bugzilla.suse.com/1253611"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47913/"
}
],
"title": "Security update for amazon-ssm-agent",
"tracking": {
"current_release_date": "2025-11-24T09:22:22Z",
"generator": {
"date": "2025-11-24T09:22:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4191-1",
"initial_release_date": "2025-11-24T09:22:22Z",
"revision_history": [
{
"date": "2025-11-24T09:22:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"product": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"product_id": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"product": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"product_id": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47913"
}
],
"notes": [
{
"category": "general",
"text": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"openSUSE Leap 15.6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"openSUSE Leap 15.6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47913",
"url": "https://www.suse.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "SUSE Bug 1253506 for CVE-2025-47913",
"url": "https://bugzilla.suse.com/1253506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"openSUSE Leap 15.6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"openSUSE Leap 15.6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64",
"openSUSE Leap 15.6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.aarch64",
"openSUSE Leap 15.6:amazon-ssm-agent-3.3.1611.0-150000.5.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-24T09:22:22Z",
"details": "important"
}
],
"title": "CVE-2025-47913"
}
]
}
SUSE-SU-2025:4244-1
Vulnerability from csaf_suse - Published: 2025-11-26 08:38 - Updated: 2025-11-26 08:38Summary
Security update for amazon-ssm-agent
Notes
Title of the patch
Security update for amazon-ssm-agent
Description of the patch
This update for amazon-ssm-agent fixes the following issues:
- CVE-2025-47913: Fixed a bug in the client process termination when receiving an unexpected message type in response to a key listing or signing request. (bsc#1253598)
Patchnames
SUSE-2025-4244,SUSE-SLE-Module-Public-Cloud-12-2025-4244
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for amazon-ssm-agent",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for amazon-ssm-agent fixes the following issues:\n\n- CVE-2025-47913: Fixed a bug in the client process termination when receiving an unexpected message type in response to a key listing or signing request. (bsc#1253598)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4244,SUSE-SLE-Module-Public-Cloud-12-2025-4244",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4244-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4244-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254244-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4244-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023370.html"
},
{
"category": "self",
"summary": "SUSE Bug 1253611",
"url": "https://bugzilla.suse.com/1253611"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47913/"
}
],
"title": "Security update for amazon-ssm-agent",
"tracking": {
"current_release_date": "2025-11-26T08:38:47Z",
"generator": {
"date": "2025-11-26T08:38:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4244-1",
"initial_release_date": "2025-11-26T08:38:47Z",
"revision_history": [
{
"date": "2025-11-26T08:38:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "amazon-ssm-agent-3.3.1611.0-4.42.1.aarch64",
"product": {
"name": "amazon-ssm-agent-3.3.1611.0-4.42.1.aarch64",
"product_id": "amazon-ssm-agent-3.3.1611.0-4.42.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "amazon-ssm-agent-3.3.1611.0-4.42.1.x86_64",
"product": {
"name": "amazon-ssm-agent-3.3.1611.0-4.42.1.x86_64",
"product_id": "amazon-ssm-agent-3.3.1611.0-4.42.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-4.42.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:amazon-ssm-agent-3.3.1611.0-4.42.1.aarch64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-4.42.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.1611.0-4.42.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:amazon-ssm-agent-3.3.1611.0-4.42.1.x86_64"
},
"product_reference": "amazon-ssm-agent-3.3.1611.0-4.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47913"
}
],
"notes": [
{
"category": "general",
"text": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:amazon-ssm-agent-3.3.1611.0-4.42.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 12:amazon-ssm-agent-3.3.1611.0-4.42.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47913",
"url": "https://www.suse.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "SUSE Bug 1253506 for CVE-2025-47913",
"url": "https://bugzilla.suse.com/1253506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:amazon-ssm-agent-3.3.1611.0-4.42.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 12:amazon-ssm-agent-3.3.1611.0-4.42.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:amazon-ssm-agent-3.3.1611.0-4.42.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 12:amazon-ssm-agent-3.3.1611.0-4.42.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-26T08:38:47Z",
"details": "important"
}
],
"title": "CVE-2025-47913"
}
]
}
SUSE-SU-2025:4185-1
Vulnerability from csaf_suse - Published: 2025-11-24 07:57 - Updated: 2025-11-24 07:57Summary
Security update for podman
Notes
Title of the patch
Security update for podman
Description of the patch
This update for podman fixes the following issues:
- CVE-2025-47913: golang.org/x/crypto/ssh/agent: Fixed client process termination when receiving an unexpected message type in response to a key listing or signing request (bsc#1253542)
Patchnames
SUSE-2025-4185,SUSE-SLE-Micro-5.5-2025-4185,SUSE-SLE-Module-Containers-15-SP6-2025-4185,SUSE-SLE-Module-Containers-15-SP7-2025-4185,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4185,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4185,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4185,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4185,openSUSE-SLE-15.6-2025-4185
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for podman",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for podman fixes the following issues:\n\n- CVE-2025-47913: golang.org/x/crypto/ssh/agent: Fixed client process termination when receiving an unexpected message type in response to a key listing or signing request (bsc#1253542)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4185,SUSE-SLE-Micro-5.5-2025-4185,SUSE-SLE-Module-Containers-15-SP6-2025-4185,SUSE-SLE-Module-Containers-15-SP7-2025-4185,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4185,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4185,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4185,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4185,openSUSE-SLE-15.6-2025-4185",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4185-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4185-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254185-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4185-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023317.html"
},
{
"category": "self",
"summary": "SUSE Bug 1253542",
"url": "https://bugzilla.suse.com/1253542"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47913/"
}
],
"title": "Security update for podman",
"tracking": {
"current_release_date": "2025-11-24T07:57:21Z",
"generator": {
"date": "2025-11-24T07:57:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4185-1",
"initial_release_date": "2025-11-24T07:57:21Z",
"revision_history": [
{
"date": "2025-11-24T07:57:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150500.3.59.1.aarch64",
"product": {
"name": "podman-4.9.5-150500.3.59.1.aarch64",
"product_id": "podman-4.9.5-150500.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150500.3.59.1.aarch64",
"product": {
"name": "podman-remote-4.9.5-150500.3.59.1.aarch64",
"product_id": "podman-remote-4.9.5-150500.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150500.3.59.1.aarch64",
"product": {
"name": "podmansh-4.9.5-150500.3.59.1.aarch64",
"product_id": "podmansh-4.9.5-150500.3.59.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150500.3.59.1.i586",
"product": {
"name": "podman-4.9.5-150500.3.59.1.i586",
"product_id": "podman-4.9.5-150500.3.59.1.i586"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150500.3.59.1.i586",
"product": {
"name": "podman-remote-4.9.5-150500.3.59.1.i586",
"product_id": "podman-remote-4.9.5-150500.3.59.1.i586"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150500.3.59.1.i586",
"product": {
"name": "podmansh-4.9.5-150500.3.59.1.i586",
"product_id": "podmansh-4.9.5-150500.3.59.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-4.9.5-150500.3.59.1.noarch",
"product": {
"name": "podman-docker-4.9.5-150500.3.59.1.noarch",
"product_id": "podman-docker-4.9.5-150500.3.59.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150500.3.59.1.ppc64le",
"product": {
"name": "podman-4.9.5-150500.3.59.1.ppc64le",
"product_id": "podman-4.9.5-150500.3.59.1.ppc64le"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150500.3.59.1.ppc64le",
"product": {
"name": "podman-remote-4.9.5-150500.3.59.1.ppc64le",
"product_id": "podman-remote-4.9.5-150500.3.59.1.ppc64le"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150500.3.59.1.ppc64le",
"product": {
"name": "podmansh-4.9.5-150500.3.59.1.ppc64le",
"product_id": "podmansh-4.9.5-150500.3.59.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150500.3.59.1.s390x",
"product": {
"name": "podman-4.9.5-150500.3.59.1.s390x",
"product_id": "podman-4.9.5-150500.3.59.1.s390x"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150500.3.59.1.s390x",
"product": {
"name": "podman-remote-4.9.5-150500.3.59.1.s390x",
"product_id": "podman-remote-4.9.5-150500.3.59.1.s390x"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150500.3.59.1.s390x",
"product": {
"name": "podmansh-4.9.5-150500.3.59.1.s390x",
"product_id": "podmansh-4.9.5-150500.3.59.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150500.3.59.1.x86_64",
"product": {
"name": "podman-4.9.5-150500.3.59.1.x86_64",
"product_id": "podman-4.9.5-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150500.3.59.1.x86_64",
"product": {
"name": "podman-remote-4.9.5-150500.3.59.1.x86_64",
"product_id": "podman-remote-4.9.5-150500.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150500.3.59.1.x86_64",
"product": {
"name": "podmansh-4.9.5-150500.3.59.1.x86_64",
"product_id": "podmansh-4.9.5-150500.3.59.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podman-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podman-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.9.5-150500.3.59.1.noarch as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podman-docker-4.9.5-150500.3.59.1.noarch"
},
"product_reference": "podman-docker-4.9.5-150500.3.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podman-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podman-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.9.5-150500.3.59.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podman-docker-4.9.5-150500.3.59.1.noarch"
},
"product_reference": "podman-docker-4.9.5-150500.3.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podman-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podman-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.9.5-150500.3.59.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podman-docker-4.9.5-150500.3.59.1.noarch"
},
"product_reference": "podman-docker-4.9.5-150500.3.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.9.5-150500.3.59.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-docker-4.9.5-150500.3.59.1.noarch"
},
"product_reference": "podman-docker-4.9.5-150500.3.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-remote-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-remote-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podmansh-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podmansh-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.9.5-150500.3.59.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-docker-4.9.5-150500.3.59.1.noarch"
},
"product_reference": "podman-docker-4.9.5-150500.3.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podman-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podman-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.9.5-150500.3.59.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podman-docker-4.9.5-150500.3.59.1.noarch"
},
"product_reference": "podman-docker-4.9.5-150500.3.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podman-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.9.5-150500.3.59.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-docker-4.9.5-150500.3.59.1.noarch"
},
"product_reference": "podman-docker-4.9.5-150500.3.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-remote-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-remote-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:podmansh-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:podmansh-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podman-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podman-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150500.3.59.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-4.9.5-150500.3.59.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podman-docker-4.9.5-150500.3.59.1.noarch"
},
"product_reference": "podman-docker-4.9.5-150500.3.59.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150500.3.59.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.aarch64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.ppc64le"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.s390x"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podmansh-4.9.5-150500.3.59.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.x86_64"
},
"product_reference": "podmansh-4.9.5-150500.3.59.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47913"
}
],
"notes": [
{
"category": "general",
"text": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podmansh-4.9.5-150500.3.59.1.x86_64",
"openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.aarch64",
"openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.ppc64le",
"openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.s390x",
"openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.x86_64",
"openSUSE Leap 15.6:podman-docker-4.9.5-150500.3.59.1.noarch",
"openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.aarch64",
"openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.s390x",
"openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.x86_64",
"openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.aarch64",
"openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.ppc64le",
"openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.s390x",
"openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47913",
"url": "https://www.suse.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "SUSE Bug 1253506 for CVE-2025-47913",
"url": "https://bugzilla.suse.com/1253506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podmansh-4.9.5-150500.3.59.1.x86_64",
"openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.aarch64",
"openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.ppc64le",
"openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.s390x",
"openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.x86_64",
"openSUSE Leap 15.6:podman-docker-4.9.5-150500.3.59.1.noarch",
"openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.aarch64",
"openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.s390x",
"openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.x86_64",
"openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.aarch64",
"openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.ppc64le",
"openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.s390x",
"openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Micro 5.5:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Micro 5.5:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Micro 5.5:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:podmansh-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-docker-4.9.5-150500.3.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podman-remote-4.9.5-150500.3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podmansh-4.9.5-150500.3.59.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:podmansh-4.9.5-150500.3.59.1.x86_64",
"openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.aarch64",
"openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.ppc64le",
"openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.s390x",
"openSUSE Leap 15.6:podman-4.9.5-150500.3.59.1.x86_64",
"openSUSE Leap 15.6:podman-docker-4.9.5-150500.3.59.1.noarch",
"openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.aarch64",
"openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.ppc64le",
"openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.s390x",
"openSUSE Leap 15.6:podman-remote-4.9.5-150500.3.59.1.x86_64",
"openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.aarch64",
"openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.ppc64le",
"openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.s390x",
"openSUSE Leap 15.6:podmansh-4.9.5-150500.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-24T07:57:21Z",
"details": "important"
}
],
"title": "CVE-2025-47913"
}
]
}
SUSE-SU-2025:4245-1
Vulnerability from csaf_suse - Published: 2025-11-26 08:39 - Updated: 2025-11-26 08:39Summary
Security update for buildah
Notes
Title of the patch
Security update for buildah
Description of the patch
This update for buildah fixes the following issues:
- CVE-2025-47913: Fixed a bug in the client process termination when receiving an unexpected message type in response to a key listing or signing request. (bsc#1253598)
Patchnames
SUSE-2025-4245,SUSE-SLE-Module-Containers-15-SP6-2025-4245,SUSE-SLE-Module-Containers-15-SP7-2025-4245,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4245,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4245,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4245,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4245,openSUSE-SLE-15.6-2025-4245
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for buildah",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for buildah fixes the following issues:\n\n- CVE-2025-47913: Fixed a bug in the client process termination when receiving an unexpected message type in response to a key listing or signing request. (bsc#1253598)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4245,SUSE-SLE-Module-Containers-15-SP6-2025-4245,SUSE-SLE-Module-Containers-15-SP7-2025-4245,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4245,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4245,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4245,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4245,openSUSE-SLE-15.6-2025-4245",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4245-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4245-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254245-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4245-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023369.html"
},
{
"category": "self",
"summary": "SUSE Bug 1253598",
"url": "https://bugzilla.suse.com/1253598"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47913/"
}
],
"title": "Security update for buildah",
"tracking": {
"current_release_date": "2025-11-26T08:39:12Z",
"generator": {
"date": "2025-11-26T08:39:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4245-1",
"initial_release_date": "2025-11-26T08:39:12Z",
"revision_history": [
{
"date": "2025-11-26T08:39:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150500.3.48.1.aarch64",
"product": {
"name": "buildah-1.35.5-150500.3.48.1.aarch64",
"product_id": "buildah-1.35.5-150500.3.48.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150500.3.48.1.i586",
"product": {
"name": "buildah-1.35.5-150500.3.48.1.i586",
"product_id": "buildah-1.35.5-150500.3.48.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150500.3.48.1.ppc64le",
"product": {
"name": "buildah-1.35.5-150500.3.48.1.ppc64le",
"product_id": "buildah-1.35.5-150500.3.48.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150500.3.48.1.s390x",
"product": {
"name": "buildah-1.35.5-150500.3.48.1.s390x",
"product_id": "buildah-1.35.5-150500.3.48.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150500.3.48.1.x86_64",
"product": {
"name": "buildah-1.35.5-150500.3.48.1.x86_64",
"product_id": "buildah-1.35.5-150500.3.48.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.aarch64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.ppc64le"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.s390x"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.x86_64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.aarch64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.ppc64le"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.s390x"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.x86_64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:buildah-1.35.5-150500.3.48.1.aarch64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:buildah-1.35.5-150500.3.48.1.x86_64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.aarch64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.x86_64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.aarch64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.ppc64le"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.s390x"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.x86_64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:buildah-1.35.5-150500.3.48.1.ppc64le"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:buildah-1.35.5-150500.3.48.1.x86_64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.aarch64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.ppc64le"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.s390x"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150500.3.48.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.x86_64"
},
"product_reference": "buildah-1.35.5-150500.3.48.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47913"
}
],
"notes": [
{
"category": "general",
"text": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:buildah-1.35.5-150500.3.48.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:buildah-1.35.5-150500.3.48.1.x86_64",
"openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.aarch64",
"openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.ppc64le",
"openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.s390x",
"openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47913",
"url": "https://www.suse.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "SUSE Bug 1253506 for CVE-2025-47913",
"url": "https://bugzilla.suse.com/1253506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:buildah-1.35.5-150500.3.48.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:buildah-1.35.5-150500.3.48.1.x86_64",
"openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.aarch64",
"openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.ppc64le",
"openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.s390x",
"openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:buildah-1.35.5-150500.3.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:buildah-1.35.5-150500.3.48.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:buildah-1.35.5-150500.3.48.1.x86_64",
"openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.aarch64",
"openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.ppc64le",
"openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.s390x",
"openSUSE Leap 15.6:buildah-1.35.5-150500.3.48.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-26T08:39:12Z",
"details": "important"
}
],
"title": "CVE-2025-47913"
}
]
}
SUSE-SU-2025:4229-1
Vulnerability from csaf_suse - Published: 2025-11-25 12:46 - Updated: 2025-11-25 12:46Summary
Security update for buildah
Notes
Title of the patch
Security update for buildah
Description of the patch
This update for buildah fixes the following issues:
- CVE-2025-47913: Fixed a bug in the client process termination when receiving an unexpected message type in response to a key listing or signing request. (bsc#1253598)
Patchnames
SUSE-2025-4229,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4229,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4229,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4229,SUSE-Storage-7.1-2025-4229
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for buildah",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for buildah fixes the following issues:\n\n- CVE-2025-47913: Fixed a bug in the client process termination when receiving an unexpected message type in response to a key listing or signing request. (bsc#1253598)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4229,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4229,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4229,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4229,SUSE-Storage-7.1-2025-4229",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4229-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4229-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254229-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4229-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023360.html"
},
{
"category": "self",
"summary": "SUSE Bug 1253598",
"url": "https://bugzilla.suse.com/1253598"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47913/"
}
],
"title": "Security update for buildah",
"tracking": {
"current_release_date": "2025-11-25T12:46:16Z",
"generator": {
"date": "2025-11-25T12:46:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4229-1",
"initial_release_date": "2025-11-25T12:46:16Z",
"revision_history": [
{
"date": "2025-11-25T12:46:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150300.8.49.1.aarch64",
"product": {
"name": "buildah-1.35.5-150300.8.49.1.aarch64",
"product_id": "buildah-1.35.5-150300.8.49.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150300.8.49.1.i586",
"product": {
"name": "buildah-1.35.5-150300.8.49.1.i586",
"product_id": "buildah-1.35.5-150300.8.49.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150300.8.49.1.ppc64le",
"product": {
"name": "buildah-1.35.5-150300.8.49.1.ppc64le",
"product_id": "buildah-1.35.5-150300.8.49.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150300.8.49.1.s390x",
"product": {
"name": "buildah-1.35.5-150300.8.49.1.s390x",
"product_id": "buildah-1.35.5-150300.8.49.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150300.8.49.1.x86_64",
"product": {
"name": "buildah-1.35.5-150300.8.49.1.x86_64",
"product_id": "buildah-1.35.5-150300.8.49.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150300.8.49.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.aarch64"
},
"product_reference": "buildah-1.35.5-150300.8.49.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150300.8.49.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.x86_64"
},
"product_reference": "buildah-1.35.5-150300.8.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150300.8.49.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.aarch64"
},
"product_reference": "buildah-1.35.5-150300.8.49.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150300.8.49.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.ppc64le"
},
"product_reference": "buildah-1.35.5-150300.8.49.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150300.8.49.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.s390x"
},
"product_reference": "buildah-1.35.5-150300.8.49.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150300.8.49.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.x86_64"
},
"product_reference": "buildah-1.35.5-150300.8.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150300.8.49.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.5-150300.8.49.1.ppc64le"
},
"product_reference": "buildah-1.35.5-150300.8.49.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150300.8.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.5-150300.8.49.1.x86_64"
},
"product_reference": "buildah-1.35.5-150300.8.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150300.8.49.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:buildah-1.35.5-150300.8.49.1.aarch64"
},
"product_reference": "buildah-1.35.5-150300.8.49.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150300.8.49.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:buildah-1.35.5-150300.8.49.1.x86_64"
},
"product_reference": "buildah-1.35.5-150300.8.49.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47913"
}
],
"notes": [
{
"category": "general",
"text": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:buildah-1.35.5-150300.8.49.1.aarch64",
"SUSE Enterprise Storage 7.1:buildah-1.35.5-150300.8.49.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.5-150300.8.49.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.5-150300.8.49.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47913",
"url": "https://www.suse.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "SUSE Bug 1253506 for CVE-2025-47913",
"url": "https://bugzilla.suse.com/1253506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:buildah-1.35.5-150300.8.49.1.aarch64",
"SUSE Enterprise Storage 7.1:buildah-1.35.5-150300.8.49.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.5-150300.8.49.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.5-150300.8.49.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:buildah-1.35.5-150300.8.49.1.aarch64",
"SUSE Enterprise Storage 7.1:buildah-1.35.5-150300.8.49.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:buildah-1.35.5-150300.8.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.5-150300.8.49.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:buildah-1.35.5-150300.8.49.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-25T12:46:16Z",
"details": "important"
}
],
"title": "CVE-2025-47913"
}
]
}
SUSE-SU-2025:4274-1
Vulnerability from csaf_suse - Published: 2025-11-27 08:13 - Updated: 2025-11-27 08:13Summary
Security update for buildah
Notes
Title of the patch
Security update for buildah
Description of the patch
This update for buildah fixes the following issues:
- CVE-2025-47913: Fixed a bug in the client process termination when receiving an unexpected message type in response to a key listing or signing request. (bsc#1253598)
Patchnames
SUSE-2025-4274,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4274,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4274,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4274,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4274
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for buildah",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for buildah fixes the following issues:\n\n- CVE-2025-47913: Fixed a bug in the client process termination when receiving an unexpected message type in response to a key listing or signing request. (bsc#1253598)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4274,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4274,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4274,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4274,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4274",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4274-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4274-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254274-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4274-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023399.html"
},
{
"category": "self",
"summary": "SUSE Bug 1253598",
"url": "https://bugzilla.suse.com/1253598"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47913/"
}
],
"title": "Security update for buildah",
"tracking": {
"current_release_date": "2025-11-27T08:13:05Z",
"generator": {
"date": "2025-11-27T08:13:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4274-1",
"initial_release_date": "2025-11-27T08:13:05Z",
"revision_history": [
{
"date": "2025-11-27T08:13:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150400.3.56.1.aarch64",
"product": {
"name": "buildah-1.35.5-150400.3.56.1.aarch64",
"product_id": "buildah-1.35.5-150400.3.56.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150400.3.56.1.i586",
"product": {
"name": "buildah-1.35.5-150400.3.56.1.i586",
"product_id": "buildah-1.35.5-150400.3.56.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150400.3.56.1.ppc64le",
"product": {
"name": "buildah-1.35.5-150400.3.56.1.ppc64le",
"product_id": "buildah-1.35.5-150400.3.56.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150400.3.56.1.s390x",
"product": {
"name": "buildah-1.35.5-150400.3.56.1.s390x",
"product_id": "buildah-1.35.5-150400.3.56.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-1.35.5-150400.3.56.1.x86_64",
"product": {
"name": "buildah-1.35.5-150400.3.56.1.x86_64",
"product_id": "buildah-1.35.5-150400.3.56.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150400.3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.5-150400.3.56.1.aarch64"
},
"product_reference": "buildah-1.35.5-150400.3.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150400.3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.5-150400.3.56.1.x86_64"
},
"product_reference": "buildah-1.35.5-150400.3.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150400.3.56.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.aarch64"
},
"product_reference": "buildah-1.35.5-150400.3.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150400.3.56.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.x86_64"
},
"product_reference": "buildah-1.35.5-150400.3.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150400.3.56.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.aarch64"
},
"product_reference": "buildah-1.35.5-150400.3.56.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150400.3.56.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.ppc64le"
},
"product_reference": "buildah-1.35.5-150400.3.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150400.3.56.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.s390x"
},
"product_reference": "buildah-1.35.5-150400.3.56.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150400.3.56.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.x86_64"
},
"product_reference": "buildah-1.35.5-150400.3.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150400.3.56.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.5-150400.3.56.1.ppc64le"
},
"product_reference": "buildah-1.35.5-150400.3.56.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-1.35.5-150400.3.56.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.5-150400.3.56.1.x86_64"
},
"product_reference": "buildah-1.35.5-150400.3.56.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47913"
}
],
"notes": [
{
"category": "general",
"text": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.5-150400.3.56.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.5-150400.3.56.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.5-150400.3.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.5-150400.3.56.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47913",
"url": "https://www.suse.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "SUSE Bug 1253506 for CVE-2025-47913",
"url": "https://bugzilla.suse.com/1253506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.5-150400.3.56.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.5-150400.3.56.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.5-150400.3.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.5-150400.3.56.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.5-150400.3.56.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:buildah-1.35.5-150400.3.56.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:buildah-1.35.5-150400.3.56.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.5-150400.3.56.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:buildah-1.35.5-150400.3.56.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-27T08:13:05Z",
"details": "important"
}
],
"title": "CVE-2025-47913"
}
]
}
SUSE-SU-2025:4156-1
Vulnerability from csaf_suse - Published: 2025-11-21 14:29 - Updated: 2025-11-21 14:29Summary
Security update for podman
Notes
Title of the patch
Security update for podman
Description of the patch
This update for podman fixes the following issues:
- CVE-2025-47913: golang.org/x/crypto/ssh/agent: Fixed client process termination when receiving an unexpected message type in response to a key listing or signing request (bsc#1253542)
Patchnames
SUSE-2025-4156,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4156,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4156,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4156,SUSE-SUSE-MicroOS-5.2-2025-4156,SUSE-Storage-7.1-2025-4156
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for podman",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for podman fixes the following issues:\n\n- CVE-2025-47913: golang.org/x/crypto/ssh/agent: Fixed client process termination when receiving an unexpected message type in response to a key listing or signing request (bsc#1253542)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4156,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4156,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4156,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4156,SUSE-SUSE-MicroOS-5.2-2025-4156,SUSE-Storage-7.1-2025-4156",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4156-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4156-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254156-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4156-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023314.html"
},
{
"category": "self",
"summary": "SUSE Bug 1253542",
"url": "https://bugzilla.suse.com/1253542"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47913/"
}
],
"title": "Security update for podman",
"tracking": {
"current_release_date": "2025-11-21T14:29:28Z",
"generator": {
"date": "2025-11-21T14:29:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4156-1",
"initial_release_date": "2025-11-21T14:29:28Z",
"revision_history": [
{
"date": "2025-11-21T14:29:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150300.9.66.1.aarch64",
"product": {
"name": "podman-4.9.5-150300.9.66.1.aarch64",
"product_id": "podman-4.9.5-150300.9.66.1.aarch64"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150300.9.66.1.aarch64",
"product": {
"name": "podman-remote-4.9.5-150300.9.66.1.aarch64",
"product_id": "podman-remote-4.9.5-150300.9.66.1.aarch64"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150300.9.66.1.aarch64",
"product": {
"name": "podmansh-4.9.5-150300.9.66.1.aarch64",
"product_id": "podmansh-4.9.5-150300.9.66.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150300.9.66.1.i586",
"product": {
"name": "podman-4.9.5-150300.9.66.1.i586",
"product_id": "podman-4.9.5-150300.9.66.1.i586"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150300.9.66.1.i586",
"product": {
"name": "podman-remote-4.9.5-150300.9.66.1.i586",
"product_id": "podman-remote-4.9.5-150300.9.66.1.i586"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150300.9.66.1.i586",
"product": {
"name": "podmansh-4.9.5-150300.9.66.1.i586",
"product_id": "podmansh-4.9.5-150300.9.66.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-4.9.5-150300.9.66.1.noarch",
"product": {
"name": "podman-docker-4.9.5-150300.9.66.1.noarch",
"product_id": "podman-docker-4.9.5-150300.9.66.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150300.9.66.1.ppc64le",
"product": {
"name": "podman-4.9.5-150300.9.66.1.ppc64le",
"product_id": "podman-4.9.5-150300.9.66.1.ppc64le"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150300.9.66.1.ppc64le",
"product": {
"name": "podman-remote-4.9.5-150300.9.66.1.ppc64le",
"product_id": "podman-remote-4.9.5-150300.9.66.1.ppc64le"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150300.9.66.1.ppc64le",
"product": {
"name": "podmansh-4.9.5-150300.9.66.1.ppc64le",
"product_id": "podmansh-4.9.5-150300.9.66.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150300.9.66.1.s390x",
"product": {
"name": "podman-4.9.5-150300.9.66.1.s390x",
"product_id": "podman-4.9.5-150300.9.66.1.s390x"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150300.9.66.1.s390x",
"product": {
"name": "podman-remote-4.9.5-150300.9.66.1.s390x",
"product_id": "podman-remote-4.9.5-150300.9.66.1.s390x"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150300.9.66.1.s390x",
"product": {
"name": "podmansh-4.9.5-150300.9.66.1.s390x",
"product_id": "podmansh-4.9.5-150300.9.66.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-4.9.5-150300.9.66.1.x86_64",
"product": {
"name": "podman-4.9.5-150300.9.66.1.x86_64",
"product_id": "podman-4.9.5-150300.9.66.1.x86_64"
}
},
{
"category": "product_version",
"name": "podman-remote-4.9.5-150300.9.66.1.x86_64",
"product": {
"name": "podman-remote-4.9.5-150300.9.66.1.x86_64",
"product_id": "podman-remote-4.9.5-150300.9.66.1.x86_64"
}
},
{
"category": "product_version",
"name": "podmansh-4.9.5-150300.9.66.1.x86_64",
"product": {
"name": "podmansh-4.9.5-150300.9.66.1.x86_64",
"product_id": "podmansh-4.9.5-150300.9.66.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.aarch64"
},
"product_reference": "podman-4.9.5-150300.9.66.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.x86_64"
},
"product_reference": "podman-4.9.5-150300.9.66.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.aarch64"
},
"product_reference": "podman-4.9.5-150300.9.66.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.ppc64le"
},
"product_reference": "podman-4.9.5-150300.9.66.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.s390x"
},
"product_reference": "podman-4.9.5-150300.9.66.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.x86_64"
},
"product_reference": "podman-4.9.5-150300.9.66.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.ppc64le"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.s390x"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-4.9.5-150300.9.66.1.ppc64le"
},
"product_reference": "podman-4.9.5-150300.9.66.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-4.9.5-150300.9.66.1.x86_64"
},
"product_reference": "podman-4.9.5-150300.9.66.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-remote-4.9.5-150300.9.66.1.ppc64le"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-remote-4.9.5-150300.9.66.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:podman-4.9.5-150300.9.66.1.aarch64"
},
"product_reference": "podman-4.9.5-150300.9.66.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:podman-4.9.5-150300.9.66.1.s390x"
},
"product_reference": "podman-4.9.5-150300.9.66.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:podman-4.9.5-150300.9.66.1.x86_64"
},
"product_reference": "podman-4.9.5-150300.9.66.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:podman-remote-4.9.5-150300.9.66.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:podman-remote-4.9.5-150300.9.66.1.s390x"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:podman-remote-4.9.5-150300.9.66.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:podman-4.9.5-150300.9.66.1.aarch64"
},
"product_reference": "podman-4.9.5-150300.9.66.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-4.9.5-150300.9.66.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:podman-4.9.5-150300.9.66.1.x86_64"
},
"product_reference": "podman-4.9.5-150300.9.66.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:podman-remote-4.9.5-150300.9.66.1.aarch64"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-4.9.5-150300.9.66.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:podman-remote-4.9.5-150300.9.66.1.x86_64"
},
"product_reference": "podman-remote-4.9.5-150300.9.66.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47913"
}
],
"notes": [
{
"category": "general",
"text": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:podman-4.9.5-150300.9.66.1.aarch64",
"SUSE Enterprise Storage 7.1:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Enterprise Storage 7.1:podman-remote-4.9.5-150300.9.66.1.aarch64",
"SUSE Enterprise Storage 7.1:podman-remote-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:podman-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:podman-4.9.5-150300.9.66.1.s390x",
"SUSE Linux Enterprise Micro 5.2:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:podman-remote-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:podman-remote-4.9.5-150300.9.66.1.s390x",
"SUSE Linux Enterprise Micro 5.2:podman-remote-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-4.9.5-150300.9.66.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-remote-4.9.5-150300.9.66.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-remote-4.9.5-150300.9.66.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47913",
"url": "https://www.suse.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "SUSE Bug 1253506 for CVE-2025-47913",
"url": "https://bugzilla.suse.com/1253506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:podman-4.9.5-150300.9.66.1.aarch64",
"SUSE Enterprise Storage 7.1:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Enterprise Storage 7.1:podman-remote-4.9.5-150300.9.66.1.aarch64",
"SUSE Enterprise Storage 7.1:podman-remote-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:podman-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:podman-4.9.5-150300.9.66.1.s390x",
"SUSE Linux Enterprise Micro 5.2:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:podman-remote-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:podman-remote-4.9.5-150300.9.66.1.s390x",
"SUSE Linux Enterprise Micro 5.2:podman-remote-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-4.9.5-150300.9.66.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-remote-4.9.5-150300.9.66.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-remote-4.9.5-150300.9.66.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:podman-4.9.5-150300.9.66.1.aarch64",
"SUSE Enterprise Storage 7.1:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Enterprise Storage 7.1:podman-remote-4.9.5-150300.9.66.1.aarch64",
"SUSE Enterprise Storage 7.1:podman-remote-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:podman-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:podman-4.9.5-150300.9.66.1.s390x",
"SUSE Linux Enterprise Micro 5.2:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:podman-remote-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:podman-remote-4.9.5-150300.9.66.1.s390x",
"SUSE Linux Enterprise Micro 5.2:podman-remote-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:podman-remote-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-4.9.5-150300.9.66.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-4.9.5-150300.9.66.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-remote-4.9.5-150300.9.66.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:podman-remote-4.9.5-150300.9.66.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T14:29:28Z",
"details": "important"
}
],
"title": "CVE-2025-47913"
}
]
}
WID-SEC-W-2025-2608
Vulnerability from csaf_certbund - Published: 2025-11-16 23:00 - Updated: 2025-11-24 23:00Summary
Golang Go: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Go ist eine quelloffene Programmiersprache.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Golang Go ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Golang Go ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2608 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2608.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2608 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2608"
},
{
"category": "external",
"summary": "Go Vulnerability Report GO-2025-4116 vom 2025-11-16",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-56W8-48FP-6MGV vom 2025-11-16",
"url": "https://github.com/advisories/GHSA-56W8-48FP-6MGV"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4157-1 vom 2025-11-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023313.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15752-1 vom 2025-11-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MDLWX4URXLAOFG3T4E344QHSYWLZ3C7G/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4156-1 vom 2025-11-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023314.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4191-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XUO7YAEIM7GA7I44CRNTMPAMRZCMQHU7/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:0437-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ESXQFUOOSH3JSWSWJMX5JZJ6JHBYLHQQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4191-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023338.html"
}
],
"source_lang": "en-US",
"title": "Golang Go: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-11-24T23:00:00.000+00:00",
"generator": {
"date": "2025-11-25T08:37:15.090+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2608",
"initial_release_date": "2025-11-16T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "golang.org/x/crypto \u003c0.43.0",
"product": {
"name": "Golang Go golang.org/x/crypto \u003c0.43.0",
"product_id": "T048648"
}
},
{
"category": "product_version",
"name": "golang.org/x/crypto 0.43.0",
"product": {
"name": "Golang Go golang.org/x/crypto 0.43.0",
"product_id": "T048648-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:golang.orgxcrypto__0.43.0"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"product_status": {
"known_affected": [
"T048648",
"T002207",
"T027843"
]
},
"release_date": "2025-11-16T23:00:00.000+00:00",
"title": "CVE-2025-47913"
}
]
}
OPENSUSE-SU-2025:15773-1
Vulnerability from csaf_opensuse - Published: 2025-11-27 00:00 - Updated: 2025-11-27 00:00Summary
cheat-4.4.2-3.1 on GA media
Notes
Title of the patch
cheat-4.4.2-3.1 on GA media
Description of the patch
These are all security issues fixed in the cheat-4.4.2-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15773
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cheat-4.4.2-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the cheat-4.4.2-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15773",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15773-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47914 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47914/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58181 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58181/"
}
],
"title": "cheat-4.4.2-3.1 on GA media",
"tracking": {
"current_release_date": "2025-11-27T00:00:00Z",
"generator": {
"date": "2025-11-27T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15773-1",
"initial_release_date": "2025-11-27T00:00:00Z",
"revision_history": [
{
"date": "2025-11-27T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cheat-4.4.2-3.1.aarch64",
"product": {
"name": "cheat-4.4.2-3.1.aarch64",
"product_id": "cheat-4.4.2-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cheat-4.4.2-3.1.ppc64le",
"product": {
"name": "cheat-4.4.2-3.1.ppc64le",
"product_id": "cheat-4.4.2-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cheat-4.4.2-3.1.s390x",
"product": {
"name": "cheat-4.4.2-3.1.s390x",
"product_id": "cheat-4.4.2-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cheat-4.4.2-3.1.x86_64",
"product": {
"name": "cheat-4.4.2-3.1.x86_64",
"product_id": "cheat-4.4.2-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cheat-4.4.2-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cheat-4.4.2-3.1.aarch64"
},
"product_reference": "cheat-4.4.2-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cheat-4.4.2-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cheat-4.4.2-3.1.ppc64le"
},
"product_reference": "cheat-4.4.2-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cheat-4.4.2-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cheat-4.4.2-3.1.s390x"
},
"product_reference": "cheat-4.4.2-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cheat-4.4.2-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cheat-4.4.2-3.1.x86_64"
},
"product_reference": "cheat-4.4.2-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47913"
}
],
"notes": [
{
"category": "general",
"text": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cheat-4.4.2-3.1.aarch64",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.ppc64le",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.s390x",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47913",
"url": "https://www.suse.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "SUSE Bug 1253506 for CVE-2025-47913",
"url": "https://bugzilla.suse.com/1253506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cheat-4.4.2-3.1.aarch64",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.ppc64le",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.s390x",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cheat-4.4.2-3.1.aarch64",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.ppc64le",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.s390x",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-27T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-47913"
},
{
"cve": "CVE-2025-47914",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47914"
}
],
"notes": [
{
"category": "general",
"text": "SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cheat-4.4.2-3.1.aarch64",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.ppc64le",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.s390x",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47914",
"url": "https://www.suse.com/security/cve/CVE-2025-47914"
},
{
"category": "external",
"summary": "SUSE Bug 1253967 for CVE-2025-47914",
"url": "https://bugzilla.suse.com/1253967"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cheat-4.4.2-3.1.aarch64",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.ppc64le",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.s390x",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cheat-4.4.2-3.1.aarch64",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.ppc64le",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.s390x",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-27T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-47914"
},
{
"cve": "CVE-2025-58181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58181"
}
],
"notes": [
{
"category": "general",
"text": "SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cheat-4.4.2-3.1.aarch64",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.ppc64le",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.s390x",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58181",
"url": "https://www.suse.com/security/cve/CVE-2025-58181"
},
{
"category": "external",
"summary": "SUSE Bug 1253784 for CVE-2025-58181",
"url": "https://bugzilla.suse.com/1253784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cheat-4.4.2-3.1.aarch64",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.ppc64le",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.s390x",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cheat-4.4.2-3.1.aarch64",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.ppc64le",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.s390x",
"openSUSE Tumbleweed:cheat-4.4.2-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-27T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-58181"
}
]
}
OPENSUSE-SU-2025:15752-1
Vulnerability from csaf_opensuse - Published: 2025-11-21 00:00 - Updated: 2025-11-21 00:00Summary
act-0.2.82-2.1 on GA media
Notes
Title of the patch
act-0.2.82-2.1 on GA media
Description of the patch
These are all security issues fixed in the act-0.2.82-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15752
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "act-0.2.82-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the act-0.2.82-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15752",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15752-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47913/"
}
],
"title": "act-0.2.82-2.1 on GA media",
"tracking": {
"current_release_date": "2025-11-21T00:00:00Z",
"generator": {
"date": "2025-11-21T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15752-1",
"initial_release_date": "2025-11-21T00:00:00Z",
"revision_history": [
{
"date": "2025-11-21T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "act-0.2.82-2.1.aarch64",
"product": {
"name": "act-0.2.82-2.1.aarch64",
"product_id": "act-0.2.82-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "act-0.2.82-2.1.ppc64le",
"product": {
"name": "act-0.2.82-2.1.ppc64le",
"product_id": "act-0.2.82-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "act-0.2.82-2.1.s390x",
"product": {
"name": "act-0.2.82-2.1.s390x",
"product_id": "act-0.2.82-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "act-0.2.82-2.1.x86_64",
"product": {
"name": "act-0.2.82-2.1.x86_64",
"product_id": "act-0.2.82-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "act-0.2.82-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:act-0.2.82-2.1.aarch64"
},
"product_reference": "act-0.2.82-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "act-0.2.82-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:act-0.2.82-2.1.ppc64le"
},
"product_reference": "act-0.2.82-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "act-0.2.82-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:act-0.2.82-2.1.s390x"
},
"product_reference": "act-0.2.82-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "act-0.2.82-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:act-0.2.82-2.1.x86_64"
},
"product_reference": "act-0.2.82-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47913"
}
],
"notes": [
{
"category": "general",
"text": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:act-0.2.82-2.1.aarch64",
"openSUSE Tumbleweed:act-0.2.82-2.1.ppc64le",
"openSUSE Tumbleweed:act-0.2.82-2.1.s390x",
"openSUSE Tumbleweed:act-0.2.82-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47913",
"url": "https://www.suse.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "SUSE Bug 1253506 for CVE-2025-47913",
"url": "https://bugzilla.suse.com/1253506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:act-0.2.82-2.1.aarch64",
"openSUSE Tumbleweed:act-0.2.82-2.1.ppc64le",
"openSUSE Tumbleweed:act-0.2.82-2.1.s390x",
"openSUSE Tumbleweed:act-0.2.82-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:act-0.2.82-2.1.aarch64",
"openSUSE Tumbleweed:act-0.2.82-2.1.ppc64le",
"openSUSE Tumbleweed:act-0.2.82-2.1.s390x",
"openSUSE Tumbleweed:act-0.2.82-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-47913"
}
]
}
OPENSUSE-SU-2025:15744-1
Vulnerability from csaf_opensuse - Published: 2025-11-19 00:00 - Updated: 2025-11-19 00:00Summary
amazon-ssm-agent-3.3.3270.0-2.1 on GA media
Notes
Title of the patch
amazon-ssm-agent-3.3.3270.0-2.1 on GA media
Description of the patch
These are all security issues fixed in the amazon-ssm-agent-3.3.3270.0-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15744
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "amazon-ssm-agent-3.3.3270.0-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the amazon-ssm-agent-3.3.3270.0-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15744",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15744-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47913 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47913/"
}
],
"title": "amazon-ssm-agent-3.3.3270.0-2.1 on GA media",
"tracking": {
"current_release_date": "2025-11-19T00:00:00Z",
"generator": {
"date": "2025-11-19T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15744-1",
"initial_release_date": "2025-11-19T00:00:00Z",
"revision_history": [
{
"date": "2025-11-19T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "amazon-ssm-agent-3.3.3270.0-2.1.aarch64",
"product": {
"name": "amazon-ssm-agent-3.3.3270.0-2.1.aarch64",
"product_id": "amazon-ssm-agent-3.3.3270.0-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "amazon-ssm-agent-3.3.3270.0-2.1.ppc64le",
"product": {
"name": "amazon-ssm-agent-3.3.3270.0-2.1.ppc64le",
"product_id": "amazon-ssm-agent-3.3.3270.0-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "amazon-ssm-agent-3.3.3270.0-2.1.s390x",
"product": {
"name": "amazon-ssm-agent-3.3.3270.0-2.1.s390x",
"product_id": "amazon-ssm-agent-3.3.3270.0-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "amazon-ssm-agent-3.3.3270.0-2.1.x86_64",
"product": {
"name": "amazon-ssm-agent-3.3.3270.0-2.1.x86_64",
"product_id": "amazon-ssm-agent-3.3.3270.0-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.3270.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.aarch64"
},
"product_reference": "amazon-ssm-agent-3.3.3270.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.3270.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.ppc64le"
},
"product_reference": "amazon-ssm-agent-3.3.3270.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.3270.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.s390x"
},
"product_reference": "amazon-ssm-agent-3.3.3270.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-ssm-agent-3.3.3270.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.x86_64"
},
"product_reference": "amazon-ssm-agent-3.3.3270.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47913"
}
],
"notes": [
{
"category": "general",
"text": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.aarch64",
"openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.ppc64le",
"openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.s390x",
"openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47913",
"url": "https://www.suse.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "SUSE Bug 1253506 for CVE-2025-47913",
"url": "https://bugzilla.suse.com/1253506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.aarch64",
"openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.ppc64le",
"openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.s390x",
"openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.aarch64",
"openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.ppc64le",
"openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.s390x",
"openSUSE Tumbleweed:amazon-ssm-agent-3.3.3270.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-19T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-47913"
}
]
}
MSRC_CVE-2025-47913
Vulnerability from csaf_microsoft - Published: 2025-11-02 00:00 - Updated: 2025-11-25 01:37Summary
Potential denial of service in golang.org/x/crypto/ssh/agent
Notes
Additional Resources
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer
The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47913 Potential denial of service in golang.org/x/crypto/ssh/agent - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-47913.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Potential denial of service in golang.org/x/crypto/ssh/agent",
"tracking": {
"current_release_date": "2025-11-25T01:37:18.000Z",
"generator": {
"date": "2025-12-03T22:59:15.058Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-47913",
"initial_release_date": "2025-11-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-11-17T01:02:05.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-11-19T01:49:12.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2025-11-19T14:35:52.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2025-11-20T14:35:28.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
},
{
"date": "2025-11-25T01:37:18.000Z",
"legacy_version": "5",
"number": "5",
"summary": "Information published."
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 moby-compose 2.17.3-11",
"product": {
"name": "\u003ccbl2 moby-compose 2.17.3-11",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 moby-compose 2.17.3-11",
"product": {
"name": "cbl2 moby-compose 2.17.3-11",
"product_id": "20666"
}
}
],
"category": "product_name",
"name": "moby-compose"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 packer 1.9.5-15",
"product": {
"name": "\u003ccbl2 packer 1.9.5-15",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "cbl2 packer 1.9.5-15",
"product": {
"name": "cbl2 packer 1.9.5-15",
"product_id": "20538"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 packer 1.9.5-10",
"product": {
"name": "\u003cazl3 packer 1.9.5-10",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "azl3 packer 1.9.5-10",
"product": {
"name": "azl3 packer 1.9.5-10",
"product_id": "20566"
}
}
],
"category": "product_name",
"name": "packer"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 docker-compose 2.27.0-5",
"product": {
"name": "\u003cazl3 docker-compose 2.27.0-5",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "azl3 docker-compose 2.27.0-5",
"product": {
"name": "azl3 docker-compose 2.27.0-5",
"product_id": "19334"
}
}
],
"category": "product_name",
"name": "docker-compose"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 kubevirt 1.5.0-5",
"product": {
"name": "\u003cazl3 kubevirt 1.5.0-5",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 kubevirt 1.5.0-5",
"product": {
"name": "azl3 kubevirt 1.5.0-5",
"product_id": "20656"
}
}
],
"category": "product_name",
"name": "kubevirt"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 docker-buildx 0.14.0-7",
"product": {
"name": "\u003cazl3 docker-buildx 0.14.0-7",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 docker-buildx 0.14.0-7",
"product": {
"name": "azl3 docker-buildx 0.14.0-7",
"product_id": "20667"
}
}
],
"category": "product_name",
"name": "docker-buildx"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 telegraf 1.31.0-10",
"product": {
"name": "\u003cazl3 telegraf 1.31.0-10",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "azl3 telegraf 1.31.0-10",
"product": {
"name": "azl3 telegraf 1.31.0-10",
"product_id": "19343"
}
}
],
"category": "product_name",
"name": "telegraf"
},
{
"category": "product_name",
"name": "azl3 libcontainers-common 20240213-3",
"product": {
"name": "azl3 libcontainers-common 20240213-3",
"product_id": "8"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 moby-compose 2.17.3-11 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 moby-compose 2.17.3-11 as a component of CBL Mariner 2.0",
"product_id": "20666-17086"
},
"product_reference": "20666",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 packer 1.9.5-15 as a component of CBL Mariner 2.0",
"product_id": "17086-5"
},
"product_reference": "5",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 packer 1.9.5-15 as a component of CBL Mariner 2.0",
"product_id": "20538-17086"
},
"product_reference": "20538",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 docker-compose 2.27.0-5 as a component of Azure Linux 3.0",
"product_id": "17084-7"
},
"product_reference": "7",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 docker-compose 2.27.0-5 as a component of Azure Linux 3.0",
"product_id": "19334-17084"
},
"product_reference": "19334",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kubevirt 1.5.0-5 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kubevirt 1.5.0-5 as a component of Azure Linux 3.0",
"product_id": "20656-17084"
},
"product_reference": "20656",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 libcontainers-common 20240213-3 as a component of Azure Linux 3.0",
"product_id": "17084-8"
},
"product_reference": "8",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 packer 1.9.5-10 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 packer 1.9.5-10 as a component of Azure Linux 3.0",
"product_id": "20566-17084"
},
"product_reference": "20566",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 docker-buildx 0.14.0-7 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 docker-buildx 0.14.0-7 as a component of Azure Linux 3.0",
"product_id": "20667-17084"
},
"product_reference": "20667",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 telegraf 1.31.0-10 as a component of Azure Linux 3.0",
"product_id": "17084-6"
},
"product_reference": "6",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 telegraf 1.31.0-10 as a component of Azure Linux 3.0",
"product_id": "19343-17084"
},
"product_reference": "19343",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-8"
]
}
],
"notes": [
{
"category": "general",
"text": "Go",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20666-17086",
"20538-17086",
"19334-17084",
"20656-17084",
"20566-17084",
"20667-17084",
"19343-17084"
],
"known_affected": [
"17086-2",
"17086-5",
"17084-7",
"17084-3",
"17084-4",
"17084-1",
"17084-6"
],
"known_not_affected": [
"17084-8"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47913 Potential denial of service in golang.org/x/crypto/ssh/agent - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-47913.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-17T01:02:05.000Z",
"details": "2.17.3-12:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-11-17T01:02:05.000Z",
"details": "1.9.5-16:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-5"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-11-17T01:02:05.000Z",
"details": "2.27.0-6:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-7"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-11-17T01:02:05.000Z",
"details": "1.5.0-6:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-11-17T01:02:05.000Z",
"details": "1.9.5-11:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-4"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-11-17T01:02:05.000Z",
"details": "0.14.0-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-11-17T01:02:05.000Z",
"details": "1.31.0-11:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-6"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17086-2",
"17086-5",
"17084-7",
"17084-3",
"17084-4",
"17084-1",
"17084-6"
]
}
],
"title": "Potential denial of service in golang.org/x/crypto/ssh/agent"
}
]
}
RHSA-2025:22743
Vulnerability from csaf_redhat - Published: 2025-12-04 09:52 - Updated: 2025-12-04 17:10Summary
Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.1
Notes
Topic
Red Hat OpenShift Builds 1.6.1
Details
Releases of Red Hat OpenShift Builds 1.6.1
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Builds 1.6.1",
"title": "Topic"
},
{
"category": "general",
"text": "Releases of Red Hat OpenShift Builds 1.6.1",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22743",
"url": "https://access.redhat.com/errata/RHSA-2025:22743"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.6",
"url": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.6"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22743.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.1",
"tracking": {
"current_release_date": "2025-12-04T17:10:58+00:00",
"generator": {
"date": "2025-12-04T17:10:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2025:22743",
"initial_release_date": "2025-12-04T09:52:50+00:00",
"revision_history": [
{
"date": "2025-12-04T09:52:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-04T09:52:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-04T17:10:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Builds for Red Hat OpenShift 1.6.1",
"product": {
"name": "Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_builds:1.6::el9"
}
}
}
],
"category": "product_family",
"name": "Builds for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764897"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Aa67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Ae43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764750"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3Ab52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764462"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Ac6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764754130"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-operator-bundle@sha256%3Ad7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764836230"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Af7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764687373"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764687248"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764767096"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Ad4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764623"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3Afc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764897"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764750"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764462"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764754130"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764687373"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Aee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764687248"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764767096"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764623"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764897"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Ac4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764750"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764462"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Aaf94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764754130"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764687373"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764687248"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764767096"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764623"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764897"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764593"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764750"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3Aa68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764462"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Ae6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764754130"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3Af3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764687373"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764687248"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764767096"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1.6.1-1764764623"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64 as a component of Builds for Red Hat OpenShift 1.6.1",
"product_id": "Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64",
"relates_to_product_reference": "Builds for Red Hat OpenShift 1.6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64"
],
"known_not_affected": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-04T09:52:50+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.0 upgrades to to 1.6.1",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22743"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le"
],
"known_not_affected": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-04T09:52:50+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.6.0 upgrades to to 1.6.1",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22743"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:395818192d16d4d5bd33c6858ed83162423258a2e96554f142f5e8695f47b909_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e21d625630488801297b2a1608d4b36170a84861f13b699ae6ee83d116029ff_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:8e676677a0c02b23f8fadf3e96a6cc0329ac5758087d7413011d3adb5e40123b_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:fc0728590aef2d02281f8315213937d2b7f9686261475e3f1c6029f2d0a36ec7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:288a32807d964dc2f5800dd659ac6f52e97056c6333714305a931027e9650d07_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:51a9ba478afe04d21e08aabef4dd42dd9edc5dd6c94f6d8debff706b6c383e81_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a67a377cebc64f733e406ac1e8700618a4f4ce21a67acd90650e5c260eed8385_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:c4ff0ed2b70cd6385414bcec5e235f0086d5c040e98cb83f37b8811670eb43f9_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:05877af25bdf805f858a8e7326074e9af79da5d8a78a9145e8eba8c9fd4200e7_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:6eccdb53987e2a35b925e0fa6e7e0a5576b2591e3402f33ec2162da01637e86e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:8c6aada94d75445b65fcfda86e0639cbd3bc06d2c96c1639442d4a6c1181bdcc_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:e43e8e0411d71b6e968332c5be156f045cb27b6e183b04c0f6e57c4655740aa9_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:0b56507d8d8ac4474f1fdc66081d62005350a451b8b73ee1759acf996f7afac2_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:391c399c72d1b2154968a76fbe2c168eba92ccae154612d01bc132854b2ac5ac_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:a68e3d9055d17e2732cf14d6acc3bd0018eae883471041e3a77e66e7c985cf27_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b52bbba7ac8e0146bababeba7e960c94701c9c91880beab6ecaf53b68c033309_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:d7559752af22bbde1b5753b2d0f5fe88bf8564f5be92a01babdf13b96074adbd_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:29f639a9a4666bfbaf1e00ac9ae4edd357cd279c770bade500e2131dd5d1bdb6_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:af94cda478224ad95dee05bf1c70267b17ccafae5b59e57265ec93addc7eac93_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:c6ad655cd4cfccb1ce94c83f80eb33746cb899a7da78485bc581071c83747126_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:e6dac113de983ddcf97eb79afb8badc77ce79885c45855c97da37ce557e8fb19_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d6fe7304c89863935f1f128c354225d1d2962ffa5927792daac7f2db89b3eb5_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:22abb2c65345ce4485090b489022c2aced9041a8a36df0c393993c5981221592_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f3569c63b70cf030260a15ef955c20a9aa99adc5b55937d22e33b2b473d96070_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:f7e63c479267d3aff7439cc7c8e33cf49cb2ec65ad346c859244baead109943d_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:29d644b08a2ec4a1c5586fc3950aa61ee2df6d4bd961b5a51e7098827f29cc95_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:585e73085d2b96d3da81c6b467830d279ef63f8689a27dae5e3ae7d4d32a51e1_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:9ef68867ac0b3b993028f02dc4304d6270a8c6f27a85881f978a10fa59e2146e_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:ee92e793aaf66e7bdcf507af951e198c45bd9c309992d953535acada33673221_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4639c8447a2d5f5717cd1c28e2bbceee31b8913f29fe6066916efa66573a4752_amd64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:49616253d468bbad0598b6b3d74527de8219edbbace4b8fb3a6c2a4402645595_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:74dc1894ffbffee0316b0a9e09cd117eb69a7a7c6f207f99d571aefc10178339_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:97b80445bd1e8c9702ac61463ba432fcab7f66e0ea16da9fdea5d3e4e4fb1354_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:23dfb14441d8aa05ae61ed08a796fcd9289f3db9d1240334dfbc388fef31d757_s390x",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:7249468e1fa9c696705c20b38bdf66d5e224552c8a19034ffe2523b8cc80446c_ppc64le",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:77aa55c3379a978d4dd505999c3193f0b5b0f8a9f2890a83471c712cb529981e_arm64",
"Builds for Red Hat OpenShift 1.6.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:d4b5c336cbf156ef13a1d3869f9565849332735f31346babbc17925451b16f73_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
}
]
}
GHSA-56W8-48FP-6MGV
Vulnerability from github – Published: 2025-11-14 00:30 – Updated: 2025-11-14 00:30
VLAI?
Details
SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.
Severity ?
7.5 (High)
{
"affected": [],
"aliases": [
"CVE-2025-47913"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-11-13T22:15:51Z",
"severity": "HIGH"
},
"details": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
"id": "GHSA-56w8-48fp-6mgv",
"modified": "2025-11-14T00:30:27Z",
"published": "2025-11-14T00:30:27Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://go.dev/cl/700295"
},
{
"type": "WEB",
"url": "https://go.dev/issue/75178"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2025-47913
Vulnerability from fkie_nvd - Published: 2025-11-13 22:15 - Updated: 2025-11-14 16:42
Severity ?
Summary
SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process."
}
],
"id": "CVE-2025-47913",
"lastModified": "2025-11-14T16:42:03.187",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-11-13T22:15:51.280",
"references": [
{
"source": "security@golang.org",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"source": "security@golang.org",
"url": "https://go.dev/cl/700295"
},
{
"source": "security@golang.org",
"url": "https://go.dev/issue/75178"
},
{
"source": "security@golang.org",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Awaiting Analysis"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…