Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-68121 (GCVE-0-2025-68121)
Vulnerability from cvelistv5 – Published: 2026-02-05 17:48 – Updated: 2026-02-20 16:05- CWE-295 - Improper Certificate Validation
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Go standard library | crypto/tls |
Affected:
0 , < 1.24.13
(semver)
Affected: 1.25.0-0 , < 1.25.7 (semver) Affected: 1.26.0-rc.1 , < 1.26.0-rc.3 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-68121",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-20T16:05:03.924102Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-295",
"description": "CWE-295 Improper Certificate Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-20T16:05:07.679Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "crypto/tls",
"product": "crypto/tls",
"programRoutines": [
{
"name": "Conn.handshakeContext"
},
{
"name": "Conn.Handshake"
},
{
"name": "Conn.HandshakeContext"
},
{
"name": "Conn.Read"
},
{
"name": "Conn.Write"
},
{
"name": "Dial"
},
{
"name": "DialWithDialer"
},
{
"name": "Dialer.Dial"
},
{
"name": "Dialer.DialContext"
},
{
"name": "QUICConn.Start"
}
],
"vendor": "Go standard library",
"versions": [
{
"lessThan": "1.24.13",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "1.25.7",
"status": "affected",
"version": "1.25.0-0",
"versionType": "semver"
},
{
"lessThan": "1.26.0-rc.3",
"status": "affected",
"version": "1.26.0-rc.1",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Coia Prant (github.com/rbqvq)"
},
{
"lang": "en",
"value": "Go Security Team"
}
],
"descriptions": [
{
"lang": "en",
"value": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-295: Improper Certificate Validation",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T17:48:44.141Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"url": "https://go.dev/cl/737700"
},
{
"url": "https://go.dev/issue/77217"
},
{
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"title": "Unexpected session resumption in crypto/tls"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2025-68121",
"datePublished": "2026-02-05T17:48:44.141Z",
"dateReserved": "2025-12-15T16:48:04.451Z",
"dateUpdated": "2026-02-20T16:05:07.679Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-68121\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2026-02-05T18:16:10.857\",\"lastModified\":\"2026-02-20T17:25:50.303\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.\"},{\"lang\":\"es\",\"value\":\"Durante la reanudaci\u00f3n de la sesi\u00f3n en crypto/tls, si la Config subyacente tiene sus campos ClientCAs o RootCAs mutados entre el handshake inicial y el handshake reanudado, el handshake reanudado puede tener \u00e9xito cuando deber\u00eda haber fallado. Esto puede ocurrir cuando un usuario llama a Config.Clone y muta la Config devuelta, o usa Config.GetConfigForClient. Esto puede hacer que un cliente reanude una sesi\u00f3n con un servidor con el que no la habr\u00eda reanudado durante el handshake inicial, o hacer que un servidor reanude una sesi\u00f3n con un cliente con el que no la habr\u00eda reanudado durante el handshake inicial.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":6.0},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.24.13\",\"matchCriteriaId\":\"9FEE539A-EDC2-4044-A38C-5A0FDF567509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.25.0\",\"versionEndExcluding\":\"1.25.7\",\"matchCriteriaId\":\"B275853C-E253-485B-B469-31D1A7383965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:1.26.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E529A0EC-B944-4E2F-B26A-2A9F31AFF240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:1.26.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"553D6D90-140E-4A54-86A3-00E66AC30F3C\"}]}]}],\"references\":[{\"url\":\"https://go.dev/cl/737700\",\"source\":\"security@golang.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://go.dev/issue/77217\",\"source\":\"security@golang.org\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/K09ubi9FQFk\",\"source\":\"security@golang.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2026-4337\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-68121\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-02-20T16:05:03.924102Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-295\", \"description\": \"CWE-295 Improper Certificate Validation\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-02-06T15:32:38.457Z\"}}], \"cna\": {\"title\": \"Unexpected session resumption in crypto/tls\", \"credits\": [{\"lang\": \"en\", \"value\": \"Coia Prant (github.com/rbqvq)\"}, {\"lang\": \"en\", \"value\": \"Go Security Team\"}], \"affected\": [{\"vendor\": \"Go standard library\", \"product\": \"crypto/tls\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.24.13\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.25.0-0\", \"lessThan\": \"1.25.7\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.26.0-rc.1\", \"lessThan\": \"1.26.0-rc.3\", \"versionType\": \"semver\"}], \"packageName\": \"crypto/tls\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"Conn.handshakeContext\"}, {\"name\": \"Conn.Handshake\"}, {\"name\": \"Conn.HandshakeContext\"}, {\"name\": \"Conn.Read\"}, {\"name\": \"Conn.Write\"}, {\"name\": \"Dial\"}, {\"name\": \"DialWithDialer\"}, {\"name\": \"Dialer.Dial\"}, {\"name\": \"Dialer.DialContext\"}, {\"name\": \"QUICConn.Start\"}]}], \"references\": [{\"url\": \"https://groups.google.com/g/golang-announce/c/K09ubi9FQFk\"}, {\"url\": \"https://go.dev/cl/737700\"}, {\"url\": \"https://go.dev/issue/77217\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2026-4337\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-295: Improper Certificate Validation\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2026-02-05T17:48:44.141Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-68121\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-20T16:05:07.679Z\", \"dateReserved\": \"2025-12-15T16:48:04.451Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2026-02-05T17:48:44.141Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
SUSE-SU-2026:20132-1
Vulnerability from csaf_suse - Published: 2026-01-22 15:53 - Updated: 2026-01-22 15:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.6 (released 2026-01-15) (bsc#1244485)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-174",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20132-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20132-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620132-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20132-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-01-22T15:53:13Z",
"generator": {
"date": "2026-01-22T15:53:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20132-1",
"initial_release_date": "2026-01-22T15:53:13Z",
"revision_history": [
{
"date": "2026-01-22T15:53:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.6-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.6-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.6-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.6-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-1.25.6-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.6-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.6-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.6-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0219-1
Vulnerability from csaf_suse - Published: 2026-01-22 12:13 - Updated: 2026-01-22 12:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.12 (released 2026-01-15) (bsc#1236217)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-219,SUSE-SLE-Module-Development-Tools-15-SP7-2026-219,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-219,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-219,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-219,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-219,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-219,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-219,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-219,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-219,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-219,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-219,openSUSE-SLE-15.6-2026-219",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0219-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0219-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260219-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0219-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2026-01-22T12:13:47Z",
"generator": {
"date": "2026-01-22T12:13:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0219-1",
"initial_release_date": "2026-01-22T12:13:47Z",
"revision_history": [
{
"date": "2026-01-22T12:13:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.aarch64",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64",
"product_id": "go1.24-1.24.12-150000.1.53.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"product": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"product_id": "go1.24-race-1.24.12-150000.1.53.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.i586",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.i586",
"product_id": "go1.24-1.24.12-150000.1.53.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.i586",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.i586",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"product_id": "go1.24-1.24.12-150000.1.53.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"product_id": "go1.24-race-1.24.12-150000.1.53.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.s390x",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x",
"product_id": "go1.24-1.24.12-150000.1.53.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"product": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"product_id": "go1.24-race-1.24.12-150000.1.53.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.x86_64",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64",
"product_id": "go1.24-1.24.12-150000.1.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"product": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"product_id": "go1.24-race-1.24.12-150000.1.53.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0297-1
Vulnerability from csaf_suse - Published: 2026-01-26 16:10 - Updated: 2026-01-26 16:10Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25-openssl fixes the following issues:\n\nUpdate to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):\n\nSecurity fixes:\n\n - CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).\n - CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations (bsc#1247719).\n - CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).\n - CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n - CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74822 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \u0027file exists\u0027 when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u003cfunction\u003e: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-297,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-297,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-297,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-297,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-297,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-297,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-297,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-297,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-297",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0297-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0297-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260297-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0297-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1246118",
"url": "https://bugzilla.suse.com/1246118"
},
{
"category": "self",
"summary": "SUSE Bug 1247719",
"url": "https://bugzilla.suse.com/1247719"
},
{
"category": "self",
"summary": "SUSE Bug 1247720",
"url": "https://bugzilla.suse.com/1247720"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4674 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47907 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25-openssl",
"tracking": {
"current_release_date": "2026-01-26T16:10:54Z",
"generator": {
"date": "2026-01-26T16:10:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0297-1",
"initial_release_date": "2026-01-26T16:10:54Z",
"revision_history": [
{
"date": "2026-01-26T16:10:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.i586",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.i586",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4674"
}
],
"notes": [
{
"category": "general",
"text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4674",
"url": "https://www.suse.com/security/cve/CVE-2025-4674"
},
{
"category": "external",
"summary": "SUSE Bug 1246118 for CVE-2025-4674",
"url": "https://bugzilla.suse.com/1246118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-4674"
},
{
"cve": "CVE-2025-47906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47906"
}
],
"notes": [
{
"category": "general",
"text": "If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\"\", \".\", and \"..\"), can result in the binaries listed in the PATH being unexpectedly returned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47906",
"url": "https://www.suse.com/security/cve/CVE-2025-47906"
},
{
"category": "external",
"summary": "SUSE Bug 1247719 for CVE-2025-47906",
"url": "https://bugzilla.suse.com/1247719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47906"
},
{
"cve": "CVE-2025-47907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47907"
}
],
"notes": [
{
"category": "general",
"text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47907",
"url": "https://www.suse.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "SUSE Bug 1247720 for CVE-2025-47907",
"url": "https://bugzilla.suse.com/1247720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47907"
},
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0308-1
Vulnerability from csaf_suse - Published: 2026-01-28 08:38 - Updated: 2026-01-28 08:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24-openssl fixes the following issues:\n\nUpdate to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):\n\nSecurity fixes:\n\n - CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#74821 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-308,SUSE-SLE-Module-Development-Tools-15-SP7-2026-308,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-308,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-308,openSUSE-SLE-15.6-2026-308",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0308-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0308-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0308-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24-openssl",
"tracking": {
"current_release_date": "2026-01-28T08:38:40Z",
"generator": {
"date": "2026-01-28T08:38:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0308-1",
"initial_release_date": "2026-01-28T08:38:40Z",
"revision_history": [
{
"date": "2026-01-28T08:38:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.i586",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.i586",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0296-1
Vulnerability from csaf_suse - Published: 2026-01-26 13:51 - Updated: 2026-01-26 13:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24-openssl fixes the following issues:\n\nUpdate to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):\n\nSecurity fixes:\n\n - CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#74821 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-296,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-296,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-296,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-296,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-296,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-296,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-296,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-296,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-296",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0296-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0296-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260296-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0296-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24-openssl",
"tracking": {
"current_release_date": "2026-01-26T13:51:05Z",
"generator": {
"date": "2026-01-26T13:51:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0296-1",
"initial_release_date": "2026-01-26T13:51:05Z",
"revision_history": [
{
"date": "2026-01-26T13:51:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.i586",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.i586",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:20122-1
Vulnerability from csaf_suse - Published: 2026-01-22 12:53 - Updated: 2026-01-22 12:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.12 (released 2026-01-15) (bsc#1236217)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-166",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20122-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20122-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620122-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20122-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2026-01-22T12:53:24Z",
"generator": {
"date": "2026-01-22T12:53:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20122-1",
"initial_release_date": "2026-01-22T12:53:24Z",
"revision_history": [
{
"date": "2026-01-22T12:53:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-doc-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-libstd-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-race-1.24.12-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-1.24.12-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-doc-1.24.12-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-race-1.24.12-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-1.24.12-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-doc-1.24.12-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-race-1.24.12-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-doc-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-libstd-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-race-1.24.12-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0298-1
Vulnerability from csaf_suse - Published: 2026-01-26 16:11 - Updated: 2026-01-26 16:11Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25-openssl fixes the following issues:\n\nUpdate to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):\n\nSecurity fixes:\n\n - CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).\n - CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations (bsc#1247719).\n - CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).\n - CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n - CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74822 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \u0027file exists\u0027 when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u003cfunction\u003e: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-298,SUSE-SLE-Module-Development-Tools-15-SP7-2026-298,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-298,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-298,openSUSE-SLE-15.6-2026-298",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0298-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0298-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260298-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0298-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1246118",
"url": "https://bugzilla.suse.com/1246118"
},
{
"category": "self",
"summary": "SUSE Bug 1247719",
"url": "https://bugzilla.suse.com/1247719"
},
{
"category": "self",
"summary": "SUSE Bug 1247720",
"url": "https://bugzilla.suse.com/1247720"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4674 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47907 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25-openssl",
"tracking": {
"current_release_date": "2026-01-26T16:11:04Z",
"generator": {
"date": "2026-01-26T16:11:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0298-1",
"initial_release_date": "2026-01-26T16:11:04Z",
"revision_history": [
{
"date": "2026-01-26T16:11:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.i586",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.i586",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4674"
}
],
"notes": [
{
"category": "general",
"text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4674",
"url": "https://www.suse.com/security/cve/CVE-2025-4674"
},
{
"category": "external",
"summary": "SUSE Bug 1246118 for CVE-2025-4674",
"url": "https://bugzilla.suse.com/1246118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-4674"
},
{
"cve": "CVE-2025-47906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47906"
}
],
"notes": [
{
"category": "general",
"text": "If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\"\", \".\", and \"..\"), can result in the binaries listed in the PATH being unexpectedly returned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47906",
"url": "https://www.suse.com/security/cve/CVE-2025-47906"
},
{
"category": "external",
"summary": "SUSE Bug 1247719 for CVE-2025-47906",
"url": "https://bugzilla.suse.com/1247719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47906"
},
{
"cve": "CVE-2025-47907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47907"
}
],
"notes": [
{
"category": "general",
"text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47907",
"url": "https://www.suse.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "SUSE Bug 1247720 for CVE-2025-47907",
"url": "https://bugzilla.suse.com/1247720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47907"
},
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0218-1
Vulnerability from csaf_suse - Published: 2026-01-22 12:12 - Updated: 2026-01-22 12:12Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.6 (released 2026-01-15) (bsc#1244485)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-218,SUSE-SLE-Module-Development-Tools-15-SP7-2026-218,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-218,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-218,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-218,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-218,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-218,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-218,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-218,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-218,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-218,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-218,openSUSE-SLE-15.6-2026-218",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0218-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0218-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260218-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0218-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-01-22T12:12:47Z",
"generator": {
"date": "2026-01-22T12:12:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0218-1",
"initial_release_date": "2026-01-22T12:12:47Z",
"revision_history": [
{
"date": "2026-01-22T12:12:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.aarch64",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64",
"product_id": "go1.25-1.25.6-150000.1.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"product": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"product_id": "go1.25-race-1.25.6-150000.1.26.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.i586",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.i586",
"product_id": "go1.25-1.25.6-150000.1.26.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.i586",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.i586",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"product_id": "go1.25-1.25.6-150000.1.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"product_id": "go1.25-race-1.25.6-150000.1.26.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.s390x",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x",
"product_id": "go1.25-1.25.6-150000.1.26.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"product": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"product_id": "go1.25-race-1.25.6-150000.1.26.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.x86_64",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64",
"product_id": "go1.25-1.25.6-150000.1.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"product": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"product_id": "go1.25-race-1.25.6-150000.1.26.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
RHSA-2026:3187
Vulnerability from csaf_redhat - Published: 2026-02-24 11:39 - Updated: 2026-02-28 17:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana-pcp is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.\n\nSecurity Fix(es):\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3187",
"url": "https://access.redhat.com/errata/RHSA-2026:3187"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3187.json"
}
],
"title": "Red Hat Security Advisory: grafana-pcp security update",
"tracking": {
"current_release_date": "2026-02-28T17:04:13+00:00",
"generator": {
"date": "2026-02-28T17:04:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3187",
"initial_release_date": "2026-02-24T11:39:51+00:00",
"revision_history": [
{
"date": "2026-02-24T11:39:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-24T11:39:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-28T17:04:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el8_10.src",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.src",
"product_id": "grafana-pcp-0:5.1.1-12.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"product_id": "grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"product_id": "grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"product_id": "grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el8_10.s390x",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.s390x",
"product_id": "grafana-pcp-0:5.1.1-12.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T11:39:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3187"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T11:39:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3187"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3192
Vulnerability from csaf_redhat - Published: 2026-02-24 12:06 - Updated: 2026-02-28 17:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3192",
"url": "https://access.redhat.com/errata/RHSA-2026:3192"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3192.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-28T17:04:15+00:00",
"generator": {
"date": "2026-02-28T17:04:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3192",
"initial_release_date": "2026-02-24T12:06:46+00:00",
"revision_history": [
{
"date": "2026-02-24T12:06:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-24T12:06:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-28T17:04:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_0.aarch64",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_0.aarch64",
"product_id": "go-toolset-0:1.25.7-1.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_0.aarch64",
"product": {
"name": "golang-0:1.25.7-1.el10_0.aarch64",
"product_id": "golang-0:1.25.7-1.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_0.aarch64",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_0.aarch64",
"product_id": "golang-bin-0:1.25.7-1.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_0.aarch64",
"product": {
"name": "golang-race-0:1.25.7-1.el10_0.aarch64",
"product_id": "golang-race-0:1.25.7-1.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_0.ppc64le",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_0.ppc64le",
"product_id": "go-toolset-0:1.25.7-1.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_0.ppc64le",
"product": {
"name": "golang-0:1.25.7-1.el10_0.ppc64le",
"product_id": "golang-0:1.25.7-1.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_0.ppc64le",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_0.ppc64le",
"product_id": "golang-bin-0:1.25.7-1.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_0.ppc64le",
"product": {
"name": "golang-race-0:1.25.7-1.el10_0.ppc64le",
"product_id": "golang-race-0:1.25.7-1.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_0.x86_64",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_0.x86_64",
"product_id": "go-toolset-0:1.25.7-1.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_0.x86_64",
"product": {
"name": "golang-0:1.25.7-1.el10_0.x86_64",
"product_id": "golang-0:1.25.7-1.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_0.x86_64",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_0.x86_64",
"product_id": "golang-bin-0:1.25.7-1.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_0.x86_64",
"product": {
"name": "golang-race-0:1.25.7-1.el10_0.x86_64",
"product_id": "golang-race-0:1.25.7-1.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_0.s390x",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_0.s390x",
"product_id": "go-toolset-0:1.25.7-1.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_0.s390x",
"product": {
"name": "golang-0:1.25.7-1.el10_0.s390x",
"product_id": "golang-0:1.25.7-1.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_0.s390x",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_0.s390x",
"product_id": "golang-bin-0:1.25.7-1.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_0.s390x",
"product": {
"name": "golang-race-0:1.25.7-1.el10_0.s390x",
"product_id": "golang-race-0:1.25.7-1.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_0.src",
"product": {
"name": "golang-0:1.25.7-1.el10_0.src",
"product_id": "golang-0:1.25.7-1.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.el10_0.noarch",
"product": {
"name": "golang-docs-0:1.25.7-1.el10_0.noarch",
"product_id": "golang-docs-0:1.25.7-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.el10_0.noarch",
"product": {
"name": "golang-misc-0:1.25.7-1.el10_0.noarch",
"product_id": "golang-misc-0:1.25.7-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.el10_0.noarch",
"product": {
"name": "golang-src-0:1.25.7-1.el10_0.noarch",
"product_id": "golang-src-0:1.25.7-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.el10_0.noarch",
"product": {
"name": "golang-tests-0:1.25.7-1.el10_0.noarch",
"product_id": "golang-tests-0:1.25.7-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.el10_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64"
},
"product_reference": "golang-0:1.25.7-1.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le"
},
"product_reference": "golang-0:1.25.7-1.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x"
},
"product_reference": "golang-0:1.25.7-1.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src"
},
"product_reference": "golang-0:1.25.7-1.el10_0.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64"
},
"product_reference": "golang-0:1.25.7-1.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch"
},
"product_reference": "golang-docs-0:1.25.7-1.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch"
},
"product_reference": "golang-misc-0:1.25.7-1.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64"
},
"product_reference": "golang-race-0:1.25.7-1.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le"
},
"product_reference": "golang-race-0:1.25.7-1.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x"
},
"product_reference": "golang-race-0:1.25.7-1.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64"
},
"product_reference": "golang-race-0:1.25.7-1.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch"
},
"product_reference": "golang-src-0:1.25.7-1.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
},
"product_reference": "golang-tests-0:1.25.7-1.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:06:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3192"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:06:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3192"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:06:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3192"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:06:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3192"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:2914
Vulnerability from csaf_redhat - Published: 2026-02-18 11:31 - Updated: 2026-03-01 02:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross?Dashboard Privilege Escalation (CVE-2026-21721)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2914",
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2433242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433242"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2914.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-03-01T02:06:57+00:00",
"generator": {
"date": "2026-03-01T02:06:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:2914",
"initial_release_date": "2026-02-18T11:31:17+00:00",
"revision_history": [
{
"date": "2026-02-18T11:31:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-18T11:31:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:06:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.s390x",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.s390x",
"product_id": "grafana-0:10.2.6-22.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-22.el10_1.s390x",
"product": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.s390x",
"product_id": "grafana-selinux-0:10.2.6-22.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-22.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"product": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"product_id": "grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-22.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"product": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"product_id": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-22.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.x86_64",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.x86_64",
"product_id": "grafana-0:10.2.6-22.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-22.el10_1.x86_64",
"product": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.x86_64",
"product_id": "grafana-selinux-0:10.2.6-22.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-22.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"product": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"product_id": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-22.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"product_id": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-22.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.src",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.src",
"product_id": "grafana-0:10.2.6-22.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.aarch64",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.aarch64",
"product_id": "grafana-0:10.2.6-22.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"product": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"product_id": "grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-22.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"product": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"product_id": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-22.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"product_id": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-22.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.ppc64le",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.ppc64le",
"product_id": "grafana-0:10.2.6-22.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"product": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"product_id": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-22.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"product": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"product_id": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-22.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"product": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"product_id": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-22.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le"
},
"product_reference": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x"
},
"product_reference": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64"
},
"product_reference": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le"
},
"product_reference": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x"
},
"product_reference": "grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64"
},
"product_reference": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64"
},
"product_reference": "grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le"
},
"product_reference": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x"
},
"product_reference": "grafana-selinux-0:10.2.6-22.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
},
"product_reference": "grafana-selinux-0:10.2.6-22.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
},
{
"cve": "CVE-2026-21721",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"discovery_date": "2026-01-27T10:02:34.317952+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2433242"
}
],
"notes": [
{
"category": "description",
"text": "The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashboards. This is an organization\u2011internal privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross\u2011Dashboard Privilege Escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21721"
},
{
"category": "external",
"summary": "RHBZ#2433242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21721"
},
{
"category": "external",
"summary": "https://grafana.com/security/security-advisories/CVE-2026-21721",
"url": "https://grafana.com/security/security-advisories/CVE-2026-21721"
}
],
"release_date": "2026-01-27T09:07:55.160000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross\u2011Dashboard Privilege Escalation"
}
]
}
RHSA-2026:3089
Vulnerability from csaf_redhat - Published: 2026-02-23 14:46 - Updated: 2026-02-28 17:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Developer Hub 1.8.4 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Developer Hub (RHDH) is Red Hat\u0027s enterprise-grade, self-managed, customizable developer portal based on Backstage.io. RHDH is supported on OpenShift and other major Kubernetes clusters (AKS, EKS, GKE). The core features of RHDH include a single pane of glass, a centralized software catalog, self-service via golden path templates, and Tech Docs. RHDH is extensible by plugins.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3089",
"url": "https://access.redhat.com/errata/RHSA-2026:3089"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://catalog.redhat.com/search?gs\u0026searchType=containers\u0026q=rhdh",
"url": "https://catalog.redhat.com/search?gs\u0026searchType=containers\u0026q=rhdh"
},
{
"category": "external",
"summary": "https://developers.redhat.com/rhdh/overview",
"url": "https://developers.redhat.com/rhdh/overview"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_developer_hub",
"url": "https://docs.redhat.com/en/documentation/red_hat_developer_hub"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-11792",
"url": "https://issues.redhat.com/browse/RHIDP-11792"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12149",
"url": "https://issues.redhat.com/browse/RHIDP-12149"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3089.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Developer Hub 1.8.4 release.",
"tracking": {
"current_release_date": "2026-02-28T17:04:13+00:00",
"generator": {
"date": "2026-02-28T17:04:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3089",
"initial_release_date": "2026-02-23T14:46:08+00:00",
"revision_history": [
{
"date": "2026-02-23T14:46:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-23T14:46:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-28T17:04:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Hub 1.8",
"product": {
"name": "Red Hat Developer Hub 1.8",
"product_id": "Red Hat Developer Hub 1.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhdh:1.8::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Hub"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-hub-rhel9@sha256%3A66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1771455166"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-rhel9-operator@sha256%3A6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1771440517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-operator-bundle@sha256%3Aa375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1771459285"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64 as a component of Red Hat Developer Hub 1.8",
"product_id": "Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64 as a component of Red Hat Developer Hub 1.8",
"product_id": "Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64 as a component of Red Hat Developer Hub 1.8",
"product_id": "Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T14:46:08+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3089"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T14:46:08+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3089"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3035
Vulnerability from csaf_redhat - Published: 2026-02-23 01:30 - Updated: 2026-03-01 02:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana-pcp is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3035",
"url": "https://access.redhat.com/errata/RHSA-2026:3035"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3035.json"
}
],
"title": "Red Hat Security Advisory: grafana-pcp security update",
"tracking": {
"current_release_date": "2026-03-01T02:07:03+00:00",
"generator": {
"date": "2026-03-01T02:07:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3035",
"initial_release_date": "2026-02-23T01:30:21+00:00",
"revision_history": [
{
"date": "2026-02-23T01:30:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-23T01:30:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:07:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.3.0-2.el10_1.src",
"product": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.src",
"product_id": "grafana-pcp-0:5.3.0-2.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.3.0-2.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"product": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"product_id": "grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.3.0-2.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"product": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"product_id": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.3.0-2.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"product_id": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.3.0-2.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"product": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"product_id": "grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.3.0-2.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"product": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"product_id": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.3.0-2.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"product": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"product_id": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.3.0-2.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.3.0-2.el10_1.s390x",
"product": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.s390x",
"product_id": "grafana-pcp-0:5.3.0-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.3.0-2.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"product": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"product_id": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.3.0-2.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"product": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"product_id": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.3.0-2.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"product": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"product_id": "grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.3.0-2.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64",
"product": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64",
"product_id": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.3.0-2.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"product_id": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.3.0-2.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64"
},
"product_reference": "grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le"
},
"product_reference": "grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x"
},
"product_reference": "grafana-pcp-0:5.3.0-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src"
},
"product_reference": "grafana-pcp-0:5.3.0-2.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64"
},
"product_reference": "grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le"
},
"product_reference": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x"
},
"product_reference": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64"
},
"product_reference": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le"
},
"product_reference": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x"
},
"product_reference": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
},
"product_reference": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T01:30:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3035"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T01:30:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3035"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T01:30:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3035"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:2708
Vulnerability from csaf_redhat - Published: 2026-02-16 10:08 - Updated: 2026-02-28 17:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2708",
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2708.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2026-02-28T17:04:10+00:00",
"generator": {
"date": "2026-02-28T17:04:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:2708",
"initial_release_date": "2026-02-16T10:08:41+00:00",
"revision_history": [
{
"date": "2026-02-16T10:08:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T10:08:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-28T17:04:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=src\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=src\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product": {
"name": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8)",
"product_id": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product": {
"name": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8)",
"product_id": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product": {
"name": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8)",
"product_id": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product": {
"name": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8)",
"product_id": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3343
Vulnerability from csaf_redhat - Published: 2026-02-25 11:50 - Updated: 2026-03-01 02:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for skopeo is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3343",
"url": "https://access.redhat.com/errata/RHSA-2026:3343"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3343.json"
}
],
"title": "Red Hat Security Advisory: skopeo security update",
"tracking": {
"current_release_date": "2026-03-01T02:07:18+00:00",
"generator": {
"date": "2026-03-01T02:07:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3343",
"initial_release_date": "2026-02-25T11:50:40+00:00",
"revision_history": [
{
"date": "2026-02-25T11:50:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T11:50:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:07:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el10_1.src",
"product": {
"name": "skopeo-2:1.20.0-3.el10_1.src",
"product_id": "skopeo-2:1.20.0-3.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el10_1?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el10_1.aarch64",
"product": {
"name": "skopeo-2:1.20.0-3.el10_1.aarch64",
"product_id": "skopeo-2:1.20.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"product_id": "skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"product_id": "skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el10_1?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el10_1.ppc64le",
"product": {
"name": "skopeo-2:1.20.0-3.el10_1.ppc64le",
"product_id": "skopeo-2:1.20.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"product_id": "skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"product_id": "skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el10_1?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el10_1.x86_64",
"product": {
"name": "skopeo-2:1.20.0-3.el10_1.x86_64",
"product_id": "skopeo-2:1.20.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el10_1.x86_64",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.x86_64",
"product_id": "skopeo-tests-2:1.20.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"product_id": "skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el10_1?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el10_1.s390x",
"product": {
"name": "skopeo-2:1.20.0-3.el10_1.s390x",
"product_id": "skopeo-2:1.20.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el10_1.s390x",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.s390x",
"product_id": "skopeo-tests-2:1.20.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"product_id": "skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el10_1?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64"
},
"product_reference": "skopeo-2:1.20.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le"
},
"product_reference": "skopeo-2:1.20.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x"
},
"product_reference": "skopeo-2:1.20.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src"
},
"product_reference": "skopeo-2:1.20.0-3.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64"
},
"product_reference": "skopeo-2:1.20.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:50:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3343"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:50:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3343"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:50:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3343"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3188
Vulnerability from csaf_redhat - Published: 2026-02-24 11:39 - Updated: 2026-02-28 17:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3188",
"url": "https://access.redhat.com/errata/RHSA-2026:3188"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3188.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-02-28T17:04:13+00:00",
"generator": {
"date": "2026-02-28T17:04:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3188",
"initial_release_date": "2026-02-24T11:39:36+00:00",
"revision_history": [
{
"date": "2026-02-24T11:39:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-24T11:39:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-28T17:04:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-28.el8_10.aarch64",
"product": {
"name": "grafana-0:9.2.10-28.el8_10.aarch64",
"product_id": "grafana-0:9.2.10-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"product": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"product_id": "grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"product": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"product_id": "grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"product": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"product_id": "grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-28.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-28.el8_10.ppc64le",
"product": {
"name": "grafana-0:9.2.10-28.el8_10.ppc64le",
"product_id": "grafana-0:9.2.10-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"product": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"product_id": "grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"product": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"product_id": "grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"product": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"product_id": "grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-28.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-28.el8_10.x86_64",
"product": {
"name": "grafana-0:9.2.10-28.el8_10.x86_64",
"product_id": "grafana-0:9.2.10-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-28.el8_10.x86_64",
"product": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.x86_64",
"product_id": "grafana-selinux-0:9.2.10-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"product": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"product_id": "grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"product": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"product_id": "grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-28.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-28.el8_10.s390x",
"product": {
"name": "grafana-0:9.2.10-28.el8_10.s390x",
"product_id": "grafana-0:9.2.10-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-28.el8_10.s390x",
"product": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.s390x",
"product_id": "grafana-selinux-0:9.2.10-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"product": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"product_id": "grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"product": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"product_id": "grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-28.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-28.el8_10.src",
"product": {
"name": "grafana-0:9.2.10-28.el8_10.src",
"product_id": "grafana-0:9.2.10-28.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-28.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64"
},
"product_reference": "grafana-0:9.2.10-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le"
},
"product_reference": "grafana-0:9.2.10-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x"
},
"product_reference": "grafana-0:9.2.10-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-28.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src"
},
"product_reference": "grafana-0:9.2.10-28.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64"
},
"product_reference": "grafana-0:9.2.10-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64"
},
"product_reference": "grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le"
},
"product_reference": "grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x"
},
"product_reference": "grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64"
},
"product_reference": "grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64"
},
"product_reference": "grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le"
},
"product_reference": "grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x"
},
"product_reference": "grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64"
},
"product_reference": "grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64"
},
"product_reference": "grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le"
},
"product_reference": "grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x"
},
"product_reference": "grafana-selinux-0:9.2.10-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
},
"product_reference": "grafana-selinux-0:9.2.10-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T11:39:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3188"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T11:39:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3188"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T11:39:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3188"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3337
Vulnerability from csaf_redhat - Published: 2026-02-25 11:48 - Updated: 2026-03-01 02:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for podman is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3337",
"url": "https://access.redhat.com/errata/RHSA-2026:3337"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3337.json"
}
],
"title": "Red Hat Security Advisory: podman security update",
"tracking": {
"current_release_date": "2026-03-01T02:07:16+00:00",
"generator": {
"date": "2026-03-01T02:07:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3337",
"initial_release_date": "2026-02-25T11:48:26+00:00",
"revision_history": [
{
"date": "2026-02-25T11:48:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T11:48:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:07:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-6:5.6.0-14.el9_7.src",
"product": {
"name": "podman-6:5.6.0-14.el9_7.src",
"product_id": "podman-6:5.6.0-14.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-14.el9_7?arch=src\u0026epoch=6"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-plugins-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-plugins-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-remote-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-remote-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-tests-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-tests-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-remote-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-remote-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-tests-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-tests-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-plugins-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-plugins-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-remote-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-remote-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-tests-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-tests-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-plugins-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-plugins-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-remote-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-remote-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-tests-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-tests-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-debugsource-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-6:5.6.0-14.el9_7.noarch",
"product": {
"name": "podman-docker-6:5.6.0-14.el9_7.noarch",
"product_id": "podman-docker-6:5.6.0-14.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@5.6.0-14.el9_7?arch=noarch\u0026epoch=6"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-6:5.6.0-14.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src"
},
"product_reference": "podman-6:5.6.0-14.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-debugsource-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-6:5.6.0-14.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch"
},
"product_reference": "podman-docker-6:5.6.0-14.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-plugins-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-plugins-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-plugins-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-remote-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-remote-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-remote-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-remote-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-tests-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-tests-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-tests-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-tests-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:48:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3337"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:48:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3337"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:48:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3337"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:48:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3337"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3291
Vulnerability from csaf_redhat - Published: 2026-02-25 07:41 - Updated: 2026-03-01 02:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for runc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3291",
"url": "https://access.redhat.com/errata/RHSA-2026:3291"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3291.json"
}
],
"title": "Red Hat Security Advisory: runc security update",
"tracking": {
"current_release_date": "2026-03-01T02:07:13+00:00",
"generator": {
"date": "2026-03-01T02:07:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3291",
"initial_release_date": "2026-02-25T07:41:04+00:00",
"revision_history": [
{
"date": "2026-02-25T07:41:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T07:41:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:07:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "runc-4:1.4.0-2.el9_7.src",
"product": {
"name": "runc-4:1.4.0-2.el9_7.src",
"product_id": "runc-4:1.4.0-2.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.4.0-2.el9_7?arch=src\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "runc-4:1.4.0-2.el9_7.aarch64",
"product": {
"name": "runc-4:1.4.0-2.el9_7.aarch64",
"product_id": "runc-4:1.4.0-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.4.0-2.el9_7?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"product": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"product_id": "runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.4.0-2.el9_7?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"product": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"product_id": "runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.4.0-2.el9_7?arch=aarch64\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "runc-4:1.4.0-2.el9_7.ppc64le",
"product": {
"name": "runc-4:1.4.0-2.el9_7.ppc64le",
"product_id": "runc-4:1.4.0-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.4.0-2.el9_7?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"product": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"product_id": "runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.4.0-2.el9_7?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"product": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"product_id": "runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.4.0-2.el9_7?arch=ppc64le\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "runc-4:1.4.0-2.el9_7.x86_64",
"product": {
"name": "runc-4:1.4.0-2.el9_7.x86_64",
"product_id": "runc-4:1.4.0-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.4.0-2.el9_7?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-4:1.4.0-2.el9_7.x86_64",
"product": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.x86_64",
"product_id": "runc-debugsource-4:1.4.0-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.4.0-2.el9_7?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"product": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"product_id": "runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.4.0-2.el9_7?arch=x86_64\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "runc-4:1.4.0-2.el9_7.s390x",
"product": {
"name": "runc-4:1.4.0-2.el9_7.s390x",
"product_id": "runc-4:1.4.0-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.4.0-2.el9_7?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-4:1.4.0-2.el9_7.s390x",
"product": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.s390x",
"product_id": "runc-debugsource-4:1.4.0-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.4.0-2.el9_7?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"product": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"product_id": "runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.4.0-2.el9_7?arch=s390x\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-4:1.4.0-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64"
},
"product_reference": "runc-4:1.4.0-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-4:1.4.0-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le"
},
"product_reference": "runc-4:1.4.0-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-4:1.4.0-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x"
},
"product_reference": "runc-4:1.4.0-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-4:1.4.0-2.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src"
},
"product_reference": "runc-4:1.4.0-2.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-4:1.4.0-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64"
},
"product_reference": "runc-4:1.4.0-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64"
},
"product_reference": "runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le"
},
"product_reference": "runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x"
},
"product_reference": "runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64"
},
"product_reference": "runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64"
},
"product_reference": "runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le"
},
"product_reference": "runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x"
},
"product_reference": "runc-debugsource-4:1.4.0-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
},
"product_reference": "runc-debugsource-4:1.4.0-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T07:41:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3291"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T07:41:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3291"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T07:41:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3291"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3340
Vulnerability from csaf_redhat - Published: 2026-02-25 12:16 - Updated: 2026-03-01 02:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for skopeo is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3340",
"url": "https://access.redhat.com/errata/RHSA-2026:3340"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3340.json"
}
],
"title": "Red Hat Security Advisory: skopeo security update",
"tracking": {
"current_release_date": "2026-03-01T02:07:17+00:00",
"generator": {
"date": "2026-03-01T02:07:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3340",
"initial_release_date": "2026-02-25T12:16:20+00:00",
"revision_history": [
{
"date": "2026-02-25T12:16:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T12:16:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:07:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el9_7.src",
"product": {
"name": "skopeo-2:1.20.0-3.el9_7.src",
"product_id": "skopeo-2:1.20.0-3.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el9_7?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el9_7.aarch64",
"product": {
"name": "skopeo-2:1.20.0-3.el9_7.aarch64",
"product_id": "skopeo-2:1.20.0-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"product_id": "skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"product_id": "skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el9_7?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el9_7.ppc64le",
"product": {
"name": "skopeo-2:1.20.0-3.el9_7.ppc64le",
"product_id": "skopeo-2:1.20.0-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"product_id": "skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"product_id": "skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el9_7?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el9_7.x86_64",
"product": {
"name": "skopeo-2:1.20.0-3.el9_7.x86_64",
"product_id": "skopeo-2:1.20.0-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el9_7.x86_64",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.x86_64",
"product_id": "skopeo-tests-2:1.20.0-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"product_id": "skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el9_7?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el9_7.s390x",
"product": {
"name": "skopeo-2:1.20.0-3.el9_7.s390x",
"product_id": "skopeo-2:1.20.0-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el9_7.s390x",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.s390x",
"product_id": "skopeo-tests-2:1.20.0-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"product_id": "skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el9_7?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64"
},
"product_reference": "skopeo-2:1.20.0-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le"
},
"product_reference": "skopeo-2:1.20.0-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x"
},
"product_reference": "skopeo-2:1.20.0-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src"
},
"product_reference": "skopeo-2:1.20.0-3.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64"
},
"product_reference": "skopeo-2:1.20.0-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T12:16:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3340"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T12:16:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T12:16:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:2709
Vulnerability from csaf_redhat - Published: 2026-02-16 10:32 - Updated: 2026-02-28 17:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2709",
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2709.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-28T17:04:10+00:00",
"generator": {
"date": "2026-02-28T17:04:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:2709",
"initial_release_date": "2026-02-16T10:32:31+00:00",
"revision_history": [
{
"date": "2026-02-16T10:32:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T10:32:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-28T17:04:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_7.aarch64",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_7.aarch64",
"product_id": "go-toolset-0:1.25.7-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.aarch64",
"product": {
"name": "golang-0:1.25.7-1.el9_7.aarch64",
"product_id": "golang-0:1.25.7-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_7.aarch64",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_7.aarch64",
"product_id": "golang-bin-0:1.25.7-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_7.aarch64",
"product": {
"name": "golang-race-0:1.25.7-1.el9_7.aarch64",
"product_id": "golang-race-0:1.25.7-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_7.ppc64le",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_7.ppc64le",
"product_id": "go-toolset-0:1.25.7-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.ppc64le",
"product": {
"name": "golang-0:1.25.7-1.el9_7.ppc64le",
"product_id": "golang-0:1.25.7-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_7.ppc64le",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_7.ppc64le",
"product_id": "golang-bin-0:1.25.7-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_7.ppc64le",
"product": {
"name": "golang-race-0:1.25.7-1.el9_7.ppc64le",
"product_id": "golang-race-0:1.25.7-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_7.x86_64",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_7.x86_64",
"product_id": "go-toolset-0:1.25.7-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.x86_64",
"product": {
"name": "golang-0:1.25.7-1.el9_7.x86_64",
"product_id": "golang-0:1.25.7-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_7.x86_64",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_7.x86_64",
"product_id": "golang-bin-0:1.25.7-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_7.x86_64",
"product": {
"name": "golang-race-0:1.25.7-1.el9_7.x86_64",
"product_id": "golang-race-0:1.25.7-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_7.s390x",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_7.s390x",
"product_id": "go-toolset-0:1.25.7-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.s390x",
"product": {
"name": "golang-0:1.25.7-1.el9_7.s390x",
"product_id": "golang-0:1.25.7-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_7.s390x",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_7.s390x",
"product_id": "golang-bin-0:1.25.7-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_7.s390x",
"product": {
"name": "golang-race-0:1.25.7-1.el9_7.s390x",
"product_id": "golang-race-0:1.25.7-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.src",
"product": {
"name": "golang-0:1.25.7-1.el9_7.src",
"product_id": "golang-0:1.25.7-1.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.el9_7.noarch",
"product": {
"name": "golang-docs-0:1.25.7-1.el9_7.noarch",
"product_id": "golang-docs-0:1.25.7-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.el9_7.noarch",
"product": {
"name": "golang-misc-0:1.25.7-1.el9_7.noarch",
"product_id": "golang-misc-0:1.25.7-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.el9_7.noarch",
"product": {
"name": "golang-src-0:1.25.7-1.el9_7.noarch",
"product_id": "golang-src-0:1.25.7-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.el9_7.noarch",
"product": {
"name": "golang-tests-0:1.25.7-1.el9_7.noarch",
"product_id": "golang-tests-0:1.25.7-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.el9_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64"
},
"product_reference": "golang-0:1.25.7-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le"
},
"product_reference": "golang-0:1.25.7-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x"
},
"product_reference": "golang-0:1.25.7-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src"
},
"product_reference": "golang-0:1.25.7-1.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64"
},
"product_reference": "golang-0:1.25.7-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch"
},
"product_reference": "golang-docs-0:1.25.7-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch"
},
"product_reference": "golang-misc-0:1.25.7-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64"
},
"product_reference": "golang-race-0:1.25.7-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le"
},
"product_reference": "golang-race-0:1.25.7-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x"
},
"product_reference": "golang-race-0:1.25.7-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64"
},
"product_reference": "golang-race-0:1.25.7-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch"
},
"product_reference": "golang-src-0:1.25.7-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
},
"product_reference": "golang-tests-0:1.25.7-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:32:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:32:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:32:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:32:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:2706
Vulnerability from csaf_redhat - Published: 2026-02-16 09:40 - Updated: 2026-02-28 17:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2706",
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2706.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-28T17:04:10+00:00",
"generator": {
"date": "2026-02-28T17:04:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:2706",
"initial_release_date": "2026-02-16T09:40:31+00:00",
"revision_history": [
{
"date": "2026-02-16T09:40:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T09:40:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-28T17:04:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_1.aarch64",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_1.aarch64",
"product_id": "go-toolset-0:1.25.7-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.aarch64",
"product": {
"name": "golang-0:1.25.7-1.el10_1.aarch64",
"product_id": "golang-0:1.25.7-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_1.aarch64",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_1.aarch64",
"product_id": "golang-bin-0:1.25.7-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_1.aarch64",
"product": {
"name": "golang-race-0:1.25.7-1.el10_1.aarch64",
"product_id": "golang-race-0:1.25.7-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_1.ppc64le",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_1.ppc64le",
"product_id": "go-toolset-0:1.25.7-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.ppc64le",
"product": {
"name": "golang-0:1.25.7-1.el10_1.ppc64le",
"product_id": "golang-0:1.25.7-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_1.ppc64le",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_1.ppc64le",
"product_id": "golang-bin-0:1.25.7-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_1.ppc64le",
"product": {
"name": "golang-race-0:1.25.7-1.el10_1.ppc64le",
"product_id": "golang-race-0:1.25.7-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_1.x86_64",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_1.x86_64",
"product_id": "go-toolset-0:1.25.7-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.x86_64",
"product": {
"name": "golang-0:1.25.7-1.el10_1.x86_64",
"product_id": "golang-0:1.25.7-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_1.x86_64",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_1.x86_64",
"product_id": "golang-bin-0:1.25.7-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_1.x86_64",
"product": {
"name": "golang-race-0:1.25.7-1.el10_1.x86_64",
"product_id": "golang-race-0:1.25.7-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_1.s390x",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_1.s390x",
"product_id": "go-toolset-0:1.25.7-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.s390x",
"product": {
"name": "golang-0:1.25.7-1.el10_1.s390x",
"product_id": "golang-0:1.25.7-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_1.s390x",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_1.s390x",
"product_id": "golang-bin-0:1.25.7-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_1.s390x",
"product": {
"name": "golang-race-0:1.25.7-1.el10_1.s390x",
"product_id": "golang-race-0:1.25.7-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.src",
"product": {
"name": "golang-0:1.25.7-1.el10_1.src",
"product_id": "golang-0:1.25.7-1.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.el10_1.noarch",
"product": {
"name": "golang-docs-0:1.25.7-1.el10_1.noarch",
"product_id": "golang-docs-0:1.25.7-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.el10_1.noarch",
"product": {
"name": "golang-misc-0:1.25.7-1.el10_1.noarch",
"product_id": "golang-misc-0:1.25.7-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.el10_1.noarch",
"product": {
"name": "golang-src-0:1.25.7-1.el10_1.noarch",
"product_id": "golang-src-0:1.25.7-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.el10_1.noarch",
"product": {
"name": "golang-tests-0:1.25.7-1.el10_1.noarch",
"product_id": "golang-tests-0:1.25.7-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.el10_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64"
},
"product_reference": "golang-0:1.25.7-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le"
},
"product_reference": "golang-0:1.25.7-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x"
},
"product_reference": "golang-0:1.25.7-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src"
},
"product_reference": "golang-0:1.25.7-1.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64"
},
"product_reference": "golang-0:1.25.7-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch"
},
"product_reference": "golang-docs-0:1.25.7-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch"
},
"product_reference": "golang-misc-0:1.25.7-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64"
},
"product_reference": "golang-race-0:1.25.7-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le"
},
"product_reference": "golang-race-0:1.25.7-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x"
},
"product_reference": "golang-race-0:1.25.7-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64"
},
"product_reference": "golang-race-0:1.25.7-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch"
},
"product_reference": "golang-src-0:1.25.7-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
},
"product_reference": "golang-tests-0:1.25.7-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T09:40:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T09:40:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T09:40:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T09:40:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3341
Vulnerability from csaf_redhat - Published: 2026-02-25 12:14 - Updated: 2026-03-01 02:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for containernetworking-plugins is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3341",
"url": "https://access.redhat.com/errata/RHSA-2026:3341"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3341.json"
}
],
"title": "Red Hat Security Advisory: containernetworking-plugins security update",
"tracking": {
"current_release_date": "2026-03-01T02:07:17+00:00",
"generator": {
"date": "2026-03-01T02:07:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3341",
"initial_release_date": "2026-02-25T12:14:45+00:00",
"revision_history": [
{
"date": "2026-02-25T12:14:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T12:14:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:07:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.src",
"product": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.src",
"product_id": "containernetworking-plugins-1:1.7.1-3.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.7.1-3.el9_7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"product": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"product_id": "containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.7.1-3.el9_7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"product_id": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.7.1-3.el9_7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"product_id": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.7.1-3.el9_7?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"product": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"product_id": "containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.7.1-3.el9_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"product_id": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.7.1-3.el9_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.7.1-3.el9_7?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"product": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"product_id": "containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.7.1-3.el9_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64",
"product_id": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.7.1-3.el9_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"product_id": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.7.1-3.el9_7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"product": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"product_id": "containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.7.1-3.el9_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"product_id": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.7.1-3.el9_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"product_id": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.7.1-3.el9_7?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64"
},
"product_reference": "containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le"
},
"product_reference": "containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x"
},
"product_reference": "containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src"
},
"product_reference": "containernetworking-plugins-1:1.7.1-3.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64"
},
"product_reference": "containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T12:14:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3341"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T12:14:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3341"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T12:14:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3341"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3459
Vulnerability from csaf_redhat - Published: 2026-02-26 19:58 - Updated: 2026-03-01 02:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift distributed tracing platform (Tempo) 3.9.0 has been released",
"title": "Topic"
},
{
"category": "general",
"text": "This release of the Red Hat OpenShift distributed tracing platform (Tempo) provides new features, security improvements, and bug fixes.\n\n\nBreaking changes:\n\n* Nothing\n\n\nDeprecations:\n\n* Nothing\n\n\nTechnology Preview features:\n\n* Nothing\n\n\nEnhancements:\n\n* This release upgrades Tempo components to version 2.10.0, which improves TraceQL performance. Jira issue: https://issues.redhat.com/browse/TRACING-5944.\n\n* This update extends the `TempoStack` Custom Resource Definition (CRD) with a network policy option that enables the Operator to reconcile network policies among all components. This option is enabled by default. Jira issue: https://issues.redhat.com/browse/TRACING-5807.\n\n* This update adds support for overriding the Operator configuration by using environment variables. You can configure Operator settings through the `Subscription` custom resource of the Operator Lifecycle Manager (OLM) without modifying ConfigMaps. The `--config` flag remains available for custom configuration files if needed. Jira issue: https://issues.redhat.com/browse/TRACING-5745.\n\n* This update introduces the `size` field for `TempoStack` deployments, which provides predefined t-shirt size configurations. Instead of manually calculating CPU, memory, and storage for each component, you can select a size that matches your workload scale. The following sizes are available: `1x.demo`, `1x.pico`, `1x.extra-small`, `1x.small`, and `1x.medium`. This field is optional and existing configurations using `resources.total` or per-component overrides continue to work unchanged. Jira issue: https://issues.redhat.com/browse/TRACING-5376.\n\n* Improve TempoMonolithic memory usage. The Operator now automatically sets the `GOMEMLIMIT` soft memory limit for the Go garbage collector to 80% of the container memory limit for all Tempo components. This reduces the likelihood of out-of-memory terminations. Jira issue: https://issues.redhat.com/browse/TRACING-4554.\n\n* This update requires tenant configuration and an enabled gateway for `TempoStack` and `TempoMonolithic` instances. If you do not enable the gateway, the Operator displays a warning. For a `TempoStack` instance, enable the gateway by setting `.spec.template.gateway.enabled` to `true`. For a `TempoMonolithic` instance, the gateway is enabled automatically when any tenant is configured. `TempoStack` and `TempoMonolithic` instances without an enabled gateway are not supported. Jira ticket: https://issues.redhat.com/browse/TRACING-5750.\n\n* This release upgrades the Red Hat Universal Base Image (UBI) to version 9.\n\n\nBug fixes:\n\n* Fixed network policies for managed OpenShift services. Before this update, the Operator network policies used a hard-coded port 6443 for the API server. As a consequence, the Operator failed to connect to managed OpenShift services that expose the API on port 443. With this update, the Operator dynamically retrieves the control plane address from service endpoints. As a result, network policies work correctly on all OpenShift environments. Jira issue: https://issues.redhat.com/browse/TRACING-5974.\n\n* CVE-2025-61726: Before this update, a flaw existed in the `net/url` package in the Go standard library. As a consequence, a denial-of-service HTTP request with a massive number of query parameters could cause the application to consume an excessive amount of memory and eventually become unresponsive. This release eliminates this flaw. For more information, see https://access.redhat.com/security/cve/cve-2025-61726.\n\n* CVE-2025-61729: Before this update, the `HostnameError.Error()` function in the Go `crypto/x509` package used string concatenation in a loop without limiting the number of printed hostnames. As a consequence, processing a malicious certificate with many hostnames could cause excessive CPU and memory consumption, leading to a denial-of-service condition. This release includes the fix for this flaw. For more information, see https://access.redhat.com/security/cve/CVE-2025-61729.\n\n* CVE-2025-68121: Before this update, a flaw existed in the `crypto/tls` package in the Go standard library. As a consequence, during TLS session resumption, unauthorized clients or servers could bypass certificate validation if CA pools were mutated between handshakes. This release includes the fix for this flaw. For more information, see https://access.redhat.com/security/cve/CVE-2025-68121.\n\n\nKnown issues:\n\n* Gateway fails to forward OTLP HTTP traffic when receiver TLS is enabled. When Tempo Monolithic is configured with `multitenancy.enabled: true` and `ingestion.otlp.http.tls.enabled: true`, the gateway forwards OTLP HTTP traffic to the Tempo receiver using plain HTTP instead of HTTPS. As a consequence, the connection fails with a `connection reset by peer` error because the receiver expects TLS connections. OTLP gRPC ingestion through the gateway is not affected. Jira issue: https://issues.redhat.com/browse/TRACING-5973.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3459",
"url": "https://access.redhat.com/errata/RHSA-2026:3459"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3459.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.0 release",
"tracking": {
"current_release_date": "2026-03-01T02:07:20+00:00",
"generator": {
"date": "2026-03-01T02:07:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3459",
"initial_release_date": "2026-02-26T19:58:40+00:00",
"revision_history": [
{
"date": "2026-02-26T19:58:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-26T19:58:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:07:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.9.0",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.9::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256%3A90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771847684"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3Af406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843440"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843277"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Acd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843135"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3Adc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843096"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843085"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3Adf88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843082"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843440"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3Ada4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843277"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Aa03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843135"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3A836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843096"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3Acee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843085"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843082"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843440"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843277"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Afc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843135"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3A0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843096"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843085"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843082"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843440"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3Ac90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843277"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Abfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843135"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3Aecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843096"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843085"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3Ac665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843082"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T19:58:40+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3459"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T19:58:40+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3459"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T19:58:40+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3459"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3040
Vulnerability from csaf_redhat - Published: 2026-02-23 02:14 - Updated: 2026-03-01 02:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana-pcp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3040",
"url": "https://access.redhat.com/errata/RHSA-2026:3040"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3040.json"
}
],
"title": "Red Hat Security Advisory: grafana-pcp security update",
"tracking": {
"current_release_date": "2026-03-01T02:07:04+00:00",
"generator": {
"date": "2026-03-01T02:07:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3040",
"initial_release_date": "2026-02-23T02:14:35+00:00",
"revision_history": [
{
"date": "2026-02-23T02:14:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-23T02:14:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:07:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_7.src",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.src",
"product_id": "grafana-pcp-0:5.1.1-12.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"product_id": "grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"product_id": "grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"product_id": "grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_7.s390x",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.s390x",
"product_id": "grafana-pcp-0:5.1.1-12.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T02:14:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3040"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T02:14:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3040"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T02:14:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3040"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:2920
Vulnerability from csaf_redhat - Published: 2026-02-18 12:55 - Updated: 2026-03-01 02:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross?Dashboard Privilege Escalation (CVE-2026-21721)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2920",
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2433242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433242"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2920.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-03-01T02:06:59+00:00",
"generator": {
"date": "2026-03-01T02:06:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:2920",
"initial_release_date": "2026-02-18T12:55:46+00:00",
"revision_history": [
{
"date": "2026-02-18T12:55:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-18T12:55:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:06:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.src",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.src",
"product_id": "grafana-0:10.2.6-18.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.aarch64",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.aarch64",
"product_id": "grafana-0:10.2.6-18.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"product_id": "grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.ppc64le",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.ppc64le",
"product_id": "grafana-0:10.2.6-18.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"product_id": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.x86_64",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.x86_64",
"product_id": "grafana-0:10.2.6-18.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_7.x86_64",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.x86_64",
"product_id": "grafana-selinux-0:10.2.6-18.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.s390x",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.s390x",
"product_id": "grafana-0:10.2.6-18.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_7.s390x",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.s390x",
"product_id": "grafana-selinux-0:10.2.6-18.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
},
{
"cve": "CVE-2026-21721",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"discovery_date": "2026-01-27T10:02:34.317952+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2433242"
}
],
"notes": [
{
"category": "description",
"text": "The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashboards. This is an organization\u2011internal privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross\u2011Dashboard Privilege Escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21721"
},
{
"category": "external",
"summary": "RHBZ#2433242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21721"
},
{
"category": "external",
"summary": "https://grafana.com/security/security-advisories/CVE-2026-21721",
"url": "https://grafana.com/security/security-advisories/CVE-2026-21721"
}
],
"release_date": "2026-01-27T09:07:55.160000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross\u2011Dashboard Privilege Escalation"
}
]
}
RHSA-2026:3186
Vulnerability from csaf_redhat - Published: 2026-02-26 02:56 - Updated: 2026-02-28 17:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New Red Hat build of Cryostat 4.1.1 on RHEL 9 container images are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Cryostat 4 on RHEL 9 container images have been updated to fix several bugs.\n\nUsers of Cryostat 4 on RHEL 9 container images are advised to upgrade to these updated images, which contain backported patches to fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nYou can find images updated by this advisory in the Red Hat Container Catalog (see the References section).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3186",
"url": "https://access.redhat.com/errata/RHSA-2026:3186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3186.json"
}
],
"title": "Red Hat Security Advisory: Red Hat build of Cryostat 4.1.1: new RHEL 9 container image security update",
"tracking": {
"current_release_date": "2026-02-28T17:04:13+00:00",
"generator": {
"date": "2026-02-28T17:04:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3186",
"initial_release_date": "2026-02-26T02:56:36+00:00",
"revision_history": [
{
"date": "2026-02-26T02:56:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-26T02:56:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-28T17:04:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Cryostat 4 on RHEL 9",
"product": {
"name": "Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cryostat:4::el9"
}
}
}
],
"category": "product_family",
"name": "Cryostat"
},
{
"branches": [
{
"category": "product_version",
"name": "cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"product": {
"name": "cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"product_id": "cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-agent-init-rhel9\u0026tag=0.6.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"product": {
"name": "cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"product_id": "cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-db-rhel9\u0026tag=4.1.1-3"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"product": {
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"product_id": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-grafana-dashboard-rhel9\u0026tag=4.1.1-2"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"product": {
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"product_id": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-openshift-console-plugin-rhel9\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"product": {
"name": "cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"product_id": "cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-reports-rhel9\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"product": {
"name": "cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"product_id": "cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-rhel9\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"product": {
"name": "cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"product_id": "cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-operator-bundle\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"product": {
"name": "cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"product_id": "cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-rhel9-operator\u0026tag=4.1.1-3"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"product": {
"name": "cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"product_id": "cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-storage-rhel9\u0026tag=4.1.1-3"
}
}
},
{
"category": "product_version",
"name": "cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"product": {
"name": "cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"product_id": "cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/jfr-datasource-rhel9\u0026tag=4.1.1-1"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"product": {
"name": "cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"product_id": "cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-agent-init-rhel9\u0026tag=0.6.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"product": {
"name": "cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"product_id": "cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-db-rhel9\u0026tag=4.1.1-3"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"product": {
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"product_id": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-grafana-dashboard-rhel9\u0026tag=4.1.1-2"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"product": {
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"product_id": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-openshift-console-plugin-rhel9\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"product": {
"name": "cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"product_id": "cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-reports-rhel9\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"product": {
"name": "cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"product_id": "cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-rhel9\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"product": {
"name": "cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"product_id": "cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-operator-bundle\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"product": {
"name": "cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"product_id": "cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-rhel9-operator\u0026tag=4.1.1-3"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"product": {
"name": "cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"product_id": "cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-storage-rhel9\u0026tag=4.1.1-3"
}
}
},
{
"category": "product_version",
"name": "cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64",
"product": {
"name": "cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64",
"product_id": "cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/jfr-datasource-rhel9\u0026tag=4.1.1-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64"
},
"product_reference": "cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64"
},
"product_reference": "cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64"
},
"product_reference": "cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64"
},
"product_reference": "cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64"
},
"product_reference": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64"
},
"product_reference": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64"
},
"product_reference": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64"
},
"product_reference": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64"
},
"product_reference": "cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64"
},
"product_reference": "cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64"
},
"product_reference": "cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64"
},
"product_reference": "cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64"
},
"product_reference": "cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64"
},
"product_reference": "cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64"
},
"product_reference": "cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64"
},
"product_reference": "cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64"
},
"product_reference": "cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
},
"product_reference": "cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64"
},
"product_reference": "cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
},
"product_reference": "cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
],
"known_not_affected": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T02:56:36+00:00",
"details": "You can download the Cryostat 4 on RHEL 9 container images that this update provides from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available in the Red Hat Container Catalog (see the References section).\n\nDockerfiles and scripts should be amended to refer to this new image specifically or to the latest image generally.",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3186"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
],
"known_not_affected": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T02:56:36+00:00",
"details": "You can download the Cryostat 4 on RHEL 9 container images that this update provides from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available in the Red Hat Container Catalog (see the References section).\n\nDockerfiles and scripts should be amended to refer to this new image specifically or to the latest image generally.",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3186"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
],
"known_not_affected": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T02:56:36+00:00",
"details": "You can download the Cryostat 4 on RHEL 9 container images that this update provides from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available in the Red Hat Container Catalog (see the References section).\n\nDockerfiles and scripts should be amended to refer to this new image specifically or to the latest image generally.",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3186"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3193
Vulnerability from csaf_redhat - Published: 2026-02-24 12:01 - Updated: 2026-02-28 17:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3193",
"url": "https://access.redhat.com/errata/RHSA-2026:3193"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3193.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-02-28T17:04:15+00:00",
"generator": {
"date": "2026-02-28T17:04:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3193",
"initial_release_date": "2026-02-24T12:01:01+00:00",
"revision_history": [
{
"date": "2026-02-24T12:01:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-24T12:01:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-28T17:04:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_6.aarch64",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_6.aarch64",
"product_id": "go-toolset-0:1.25.7-1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_6.aarch64",
"product": {
"name": "golang-0:1.25.7-1.el9_6.aarch64",
"product_id": "golang-0:1.25.7-1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_6.aarch64",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_6.aarch64",
"product_id": "golang-bin-0:1.25.7-1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_6.aarch64",
"product": {
"name": "golang-race-0:1.25.7-1.el9_6.aarch64",
"product_id": "golang-race-0:1.25.7-1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_6.ppc64le",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_6.ppc64le",
"product_id": "go-toolset-0:1.25.7-1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_6.ppc64le",
"product": {
"name": "golang-0:1.25.7-1.el9_6.ppc64le",
"product_id": "golang-0:1.25.7-1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_6.ppc64le",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_6.ppc64le",
"product_id": "golang-bin-0:1.25.7-1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_6.ppc64le",
"product": {
"name": "golang-race-0:1.25.7-1.el9_6.ppc64le",
"product_id": "golang-race-0:1.25.7-1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_6.x86_64",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_6.x86_64",
"product_id": "go-toolset-0:1.25.7-1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_6.x86_64",
"product": {
"name": "golang-0:1.25.7-1.el9_6.x86_64",
"product_id": "golang-0:1.25.7-1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_6.x86_64",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_6.x86_64",
"product_id": "golang-bin-0:1.25.7-1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_6.x86_64",
"product": {
"name": "golang-race-0:1.25.7-1.el9_6.x86_64",
"product_id": "golang-race-0:1.25.7-1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_6.s390x",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_6.s390x",
"product_id": "go-toolset-0:1.25.7-1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_6.s390x",
"product": {
"name": "golang-0:1.25.7-1.el9_6.s390x",
"product_id": "golang-0:1.25.7-1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_6.s390x",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_6.s390x",
"product_id": "golang-bin-0:1.25.7-1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_6.s390x",
"product": {
"name": "golang-race-0:1.25.7-1.el9_6.s390x",
"product_id": "golang-race-0:1.25.7-1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_6.src",
"product": {
"name": "golang-0:1.25.7-1.el9_6.src",
"product_id": "golang-0:1.25.7-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.el9_6.noarch",
"product": {
"name": "golang-docs-0:1.25.7-1.el9_6.noarch",
"product_id": "golang-docs-0:1.25.7-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.el9_6.noarch",
"product": {
"name": "golang-misc-0:1.25.7-1.el9_6.noarch",
"product_id": "golang-misc-0:1.25.7-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.el9_6.noarch",
"product": {
"name": "golang-src-0:1.25.7-1.el9_6.noarch",
"product_id": "golang-src-0:1.25.7-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.el9_6.noarch",
"product": {
"name": "golang-tests-0:1.25.7-1.el9_6.noarch",
"product_id": "golang-tests-0:1.25.7-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.el9_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64"
},
"product_reference": "golang-0:1.25.7-1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le"
},
"product_reference": "golang-0:1.25.7-1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x"
},
"product_reference": "golang-0:1.25.7-1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src"
},
"product_reference": "golang-0:1.25.7-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64"
},
"product_reference": "golang-0:1.25.7-1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch"
},
"product_reference": "golang-docs-0:1.25.7-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch"
},
"product_reference": "golang-misc-0:1.25.7-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64"
},
"product_reference": "golang-race-0:1.25.7-1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le"
},
"product_reference": "golang-race-0:1.25.7-1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x"
},
"product_reference": "golang-race-0:1.25.7-1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64"
},
"product_reference": "golang-race-0:1.25.7-1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch"
},
"product_reference": "golang-src-0:1.25.7-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
},
"product_reference": "golang-tests-0:1.25.7-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:01:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3193"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:01:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3193"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:01:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3193"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:01:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3193"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3092
Vulnerability from csaf_redhat - Published: 2026-02-23 15:34 - Updated: 2026-02-28 17:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-github-openprinting-ipp-usb is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables\n driverless support for USB devices capable of using IPP-over-USB protocol.\n\nSecurity Fix(es):\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3092",
"url": "https://access.redhat.com/errata/RHSA-2026:3092"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3092.json"
}
],
"title": "Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update",
"tracking": {
"current_release_date": "2026-02-28T17:04:13+00:00",
"generator": {
"date": "2026-02-28T17:04:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3092",
"initial_release_date": "2026-02-23T15:34:28+00:00",
"revision_history": [
{
"date": "2026-02-23T15:34:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-23T15:34:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-28T17:04:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"product": {
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"product_id": "golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb@0.9.27-5.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-5.el10_1.aarch64",
"product": {
"name": "ipp-usb-0:0.9.27-5.el10_1.aarch64",
"product_id": "ipp-usb-0:0.9.27-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"product_id": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-5.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"product": {
"name": "ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"product_id": "ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"product_id": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-5.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-5.el10_1.s390x",
"product": {
"name": "ipp-usb-0:0.9.27-5.el10_1.s390x",
"product_id": "ipp-usb-0:0.9.27-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"product_id": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-5.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-5.el10_1.x86_64",
"product": {
"name": "ipp-usb-0:0.9.27-5.el10_1.x86_64",
"product_id": "ipp-usb-0:0.9.27-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64",
"product_id": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-5.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src"
},
"product_reference": "golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64"
},
"product_reference": "ipp-usb-0:0.9.27-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le"
},
"product_reference": "ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x"
},
"product_reference": "ipp-usb-0:0.9.27-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64"
},
"product_reference": "ipp-usb-0:0.9.27-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64"
],
"known_not_affected": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T15:34:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3092"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64"
],
"known_not_affected": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T15:34:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3092"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3336
Vulnerability from csaf_redhat - Published: 2026-02-25 11:30 - Updated: 2026-03-01 02:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for podman is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3336",
"url": "https://access.redhat.com/errata/RHSA-2026:3336"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3336.json"
}
],
"title": "Red Hat Security Advisory: podman security update",
"tracking": {
"current_release_date": "2026-03-01T02:07:15+00:00",
"generator": {
"date": "2026-03-01T02:07:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3336",
"initial_release_date": "2026-02-25T11:30:01+00:00",
"revision_history": [
{
"date": "2026-02-25T11:30:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T11:30:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:07:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-7:5.6.0-12.el10_1.src",
"product": {
"name": "podman-7:5.6.0-12.el10_1.src",
"product_id": "podman-7:5.6.0-12.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-12.el10_1?arch=src\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-remote-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-remote-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-tests-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-tests-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-remote-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-remote-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-tests-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-tests-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-remote-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-remote-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-tests-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-tests-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-remote-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-remote-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-debugsource-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-tests-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-tests-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-7:5.6.0-12.el10_1.noarch",
"product": {
"name": "podman-docker-7:5.6.0-12.el10_1.noarch",
"product_id": "podman-docker-7:5.6.0-12.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@5.6.0-12.el10_1?arch=noarch\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src"
},
"product_reference": "podman-7:5.6.0-12.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-7:5.6.0-12.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch"
},
"product_reference": "podman-docker-7:5.6.0-12.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src"
},
"product_reference": "podman-7:5.6.0-12.el10_1.src",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-7:5.6.0-12.el10_1.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch"
},
"product_reference": "podman-docker-7:5.6.0-12.el10_1.noarch",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:30:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3336"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:30:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3336"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:30:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3336"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:30:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3336"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3297
Vulnerability from csaf_redhat - Published: 2026-02-25 09:09 - Updated: 2026-03-01 02:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for buildah is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3297",
"url": "https://access.redhat.com/errata/RHSA-2026:3297"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3297.json"
}
],
"title": "Red Hat Security Advisory: buildah security update",
"tracking": {
"current_release_date": "2026-03-01T02:07:14+00:00",
"generator": {
"date": "2026-03-01T02:07:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3297",
"initial_release_date": "2026-02-25T09:09:30+00:00",
"revision_history": [
{
"date": "2026-02-25T09:09:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T09:09:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:07:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el10_1.src",
"product": {
"name": "buildah-2:1.41.8-2.el10_1.src",
"product_id": "buildah-2:1.41.8-2.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el10_1?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el10_1.aarch64",
"product": {
"name": "buildah-2:1.41.8-2.el10_1.aarch64",
"product_id": "buildah-2:1.41.8-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el10_1.aarch64",
"product": {
"name": "buildah-tests-2:1.41.8-2.el10_1.aarch64",
"product_id": "buildah-tests-2:1.41.8-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"product_id": "buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"product_id": "buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el10_1?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el10_1.ppc64le",
"product": {
"name": "buildah-2:1.41.8-2.el10_1.ppc64le",
"product_id": "buildah-2:1.41.8-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"product": {
"name": "buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"product_id": "buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"product_id": "buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"product_id": "buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el10_1?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el10_1.x86_64",
"product": {
"name": "buildah-2:1.41.8-2.el10_1.x86_64",
"product_id": "buildah-2:1.41.8-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el10_1.x86_64",
"product": {
"name": "buildah-tests-2:1.41.8-2.el10_1.x86_64",
"product_id": "buildah-tests-2:1.41.8-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"product_id": "buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"product_id": "buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el10_1?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el10_1.s390x",
"product": {
"name": "buildah-2:1.41.8-2.el10_1.s390x",
"product_id": "buildah-2:1.41.8-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el10_1.s390x",
"product": {
"name": "buildah-tests-2:1.41.8-2.el10_1.s390x",
"product_id": "buildah-tests-2:1.41.8-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"product_id": "buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"product_id": "buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el10_1?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64"
},
"product_reference": "buildah-2:1.41.8-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le"
},
"product_reference": "buildah-2:1.41.8-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x"
},
"product_reference": "buildah-2:1.41.8-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src"
},
"product_reference": "buildah-2:1.41.8-2.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64"
},
"product_reference": "buildah-2:1.41.8-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64"
},
"product_reference": "buildah-tests-2:1.41.8-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le"
},
"product_reference": "buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x"
},
"product_reference": "buildah-tests-2:1.41.8-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64"
},
"product_reference": "buildah-tests-2:1.41.8-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T09:09:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3297"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T09:09:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T09:09:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3298
Vulnerability from csaf_redhat - Published: 2026-02-25 09:32 - Updated: 2026-03-01 02:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for buildah is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.\n\nSecurity Fix(es):\n\n* buildah: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\n* buildah: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* buildah: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3298",
"url": "https://access.redhat.com/errata/RHSA-2026:3298"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3298.json"
}
],
"title": "Red Hat Security Advisory: buildah security update",
"tracking": {
"current_release_date": "2026-03-01T02:07:14+00:00",
"generator": {
"date": "2026-03-01T02:07:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3298",
"initial_release_date": "2026-02-25T09:32:15+00:00",
"revision_history": [
{
"date": "2026-02-25T09:32:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T09:32:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-01T02:07:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el9_7.src",
"product": {
"name": "buildah-2:1.41.8-2.el9_7.src",
"product_id": "buildah-2:1.41.8-2.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el9_7?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el9_7.aarch64",
"product": {
"name": "buildah-2:1.41.8-2.el9_7.aarch64",
"product_id": "buildah-2:1.41.8-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el9_7.aarch64",
"product": {
"name": "buildah-tests-2:1.41.8-2.el9_7.aarch64",
"product_id": "buildah-tests-2:1.41.8-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"product_id": "buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"product_id": "buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el9_7?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el9_7.ppc64le",
"product": {
"name": "buildah-2:1.41.8-2.el9_7.ppc64le",
"product_id": "buildah-2:1.41.8-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"product": {
"name": "buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"product_id": "buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"product_id": "buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"product_id": "buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el9_7?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el9_7.x86_64",
"product": {
"name": "buildah-2:1.41.8-2.el9_7.x86_64",
"product_id": "buildah-2:1.41.8-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el9_7.x86_64",
"product": {
"name": "buildah-tests-2:1.41.8-2.el9_7.x86_64",
"product_id": "buildah-tests-2:1.41.8-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"product_id": "buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"product_id": "buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el9_7?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el9_7.s390x",
"product": {
"name": "buildah-2:1.41.8-2.el9_7.s390x",
"product_id": "buildah-2:1.41.8-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el9_7.s390x",
"product": {
"name": "buildah-tests-2:1.41.8-2.el9_7.s390x",
"product_id": "buildah-tests-2:1.41.8-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"product_id": "buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"product_id": "buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el9_7?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64"
},
"product_reference": "buildah-2:1.41.8-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le"
},
"product_reference": "buildah-2:1.41.8-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x"
},
"product_reference": "buildah-2:1.41.8-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src"
},
"product_reference": "buildah-2:1.41.8-2.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64"
},
"product_reference": "buildah-2:1.41.8-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64"
},
"product_reference": "buildah-tests-2:1.41.8-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le"
},
"product_reference": "buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x"
},
"product_reference": "buildah-tests-2:1.41.8-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64"
},
"product_reference": "buildah-tests-2:1.41.8-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T09:32:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3298"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T09:32:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3298"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T09:32:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3298"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
cleanstart-2026-dn18334
Vulnerability from cleanstart
Security vulnerability affects the kubernetes-csi-driver-nfs-fips package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kubernetes-csi-driver-nfs-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.13.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Security vulnerability affects the kubernetes-csi-driver-nfs-fips package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed.",
"id": "CLEANSTART-2026-DN18334",
"modified": "2026-02-24T09:23:19Z",
"published": "2026-02-25T00:39:41.622120Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DN18334.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ...",
"upstream": [
"CVE-2025-68121"
]
}
cleanstart-2026-wk32717
Vulnerability from cleanstart
Multiple security vulnerabilities affect the spark-operator package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "spark-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.4.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the spark-operator package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-WK32717",
"modified": "2026-02-24T09:23:19Z",
"published": "2026-02-25T00:52:13.178542Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-WK32717.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ...",
"upstream": [
"CVE-2025-47911",
"CVE-2025-58190",
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-68121"
]
}
cleanstart-2026-uk11127
Vulnerability from cleanstart
Multiple security vulnerabilities affect the spark-operator package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "spark-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.1.1-r3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the spark-operator package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-UK11127",
"modified": "2026-02-24T09:23:19Z",
"published": "2026-02-25T00:52:43.391940Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-UK11127.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ...",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-68121"
]
}
cleanstart-2026-rd09851
Vulnerability from cleanstart
Multiple security vulnerabilities affect the prometheus-operator package. The net/url package does not set a limit on the number of query parameters in a query. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "prometheus-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.87.1-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the prometheus-operator package. The net/url package does not set a limit on the number of query parameters in a query. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-RD09851",
"modified": "2026-02-24T09:23:19Z",
"published": "2026-02-25T00:53:44.039015Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-RD09851.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "net/url package does not set a limit on the number of query parameters in a query",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121"
]
}
cleanstart-2026-tr92727
Vulnerability from cleanstart
Multiple security vulnerabilities affect the prometheus-operator-fips package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "prometheus-operator-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.88.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the prometheus-operator-fips package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-TR92727",
"modified": "2026-02-12T13:07:54Z",
"published": "2026-02-13T00:41:14.875956Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-TR92727.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ...",
"upstream": [
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2025-68121",
"GHSA-f6x5-jh6r-wrfv",
"GHSA-j5w8-q4qc-rx2x"
]
}
FKIE_CVE-2025-68121
Vulnerability from fkie_nvd - Published: 2026-02-05 18:16 - Updated: 2026-02-20 17:257.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
| URL | Tags | ||
|---|---|---|---|
| security@golang.org | https://go.dev/cl/737700 | Patch | |
| security@golang.org | https://go.dev/issue/77217 | Exploit, Issue Tracking | |
| security@golang.org | https://groups.google.com/g/golang-announce/c/K09ubi9FQFk | Mailing List, Third Party Advisory | |
| security@golang.org | https://pkg.go.dev/vuln/GO-2026-4337 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEE539A-EDC2-4044-A38C-5A0FDF567509",
"versionEndExcluding": "1.24.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B275853C-E253-485B-B469-31D1A7383965",
"versionEndExcluding": "1.25.7",
"versionStartIncluding": "1.25.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:golang:go:1.26.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E529A0EC-B944-4E2F-B26A-2A9F31AFF240",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:golang:go:1.26.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "553D6D90-140E-4A54-86A3-00E66AC30F3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake."
},
{
"lang": "es",
"value": "Durante la reanudaci\u00f3n de la sesi\u00f3n en crypto/tls, si la Config subyacente tiene sus campos ClientCAs o RootCAs mutados entre el handshake inicial y el handshake reanudado, el handshake reanudado puede tener \u00e9xito cuando deber\u00eda haber fallado. Esto puede ocurrir cuando un usuario llama a Config.Clone y muta la Config devuelta, o usa Config.GetConfigForClient. Esto puede hacer que un cliente reanude una sesi\u00f3n con un servidor con el que no la habr\u00eda reanudado durante el handshake inicial, o hacer que un servidor reanude una sesi\u00f3n con un cliente con el que no la habr\u00eda reanudado durante el handshake inicial."
}
],
"id": "CVE-2025-68121",
"lastModified": "2026-02-20T17:25:50.303",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-02-05T18:16:10.857",
"references": [
{
"source": "security@golang.org",
"tags": [
"Patch"
],
"url": "https://go.dev/cl/737700"
},
{
"source": "security@golang.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://go.dev/issue/77217"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
OPENSUSE-SU-2026:20220-1
Vulnerability from csaf_opensuse - Published: 2026-02-13 11:53 - Updated: 2026-02-13 11:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to version 1.24.13.\n\nSecurity issues fixed:\n\n- CVE-2025-61732: cmd/go: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692).\n- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does\n not account for the expiration of full certificate chain (bsc#1256818).\n- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc1256820).\n\nOther updates and bugfixes:\n\n- version update to 1.24.13:\n\n * go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs\n * go#77424 crypto/tls: CL 737700 broke session resumption on macOS\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-270",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20220-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1257692",
"url": "https://bugzilla.suse.com/1257692"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61732 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2026-02-13T11:53:30Z",
"generator": {
"date": "2026-02-13T11:53:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20220-1",
"initial_release_date": "2026-02-13T11:53:30Z",
"revision_history": [
{
"date": "2026-02-13T11:53:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.13-160000.1.1.aarch64",
"product": {
"name": "go1.24-1.24.13-160000.1.1.aarch64",
"product_id": "go1.24-1.24.13-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.13-160000.1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.13-160000.1.1.aarch64",
"product_id": "go1.24-doc-1.24.13-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.13-160000.1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.13-160000.1.1.aarch64",
"product_id": "go1.24-libstd-1.24.13-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.13-160000.1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.13-160000.1.1.aarch64",
"product_id": "go1.24-race-1.24.13-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.13-160000.1.1.ppc64le",
"product": {
"name": "go1.24-1.24.13-160000.1.1.ppc64le",
"product_id": "go1.24-1.24.13-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.13-160000.1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.13-160000.1.1.ppc64le",
"product_id": "go1.24-doc-1.24.13-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.13-160000.1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.13-160000.1.1.ppc64le",
"product_id": "go1.24-race-1.24.13-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.13-160000.1.1.s390x",
"product": {
"name": "go1.24-1.24.13-160000.1.1.s390x",
"product_id": "go1.24-1.24.13-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.13-160000.1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.13-160000.1.1.s390x",
"product_id": "go1.24-doc-1.24.13-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.13-160000.1.1.s390x",
"product": {
"name": "go1.24-race-1.24.13-160000.1.1.s390x",
"product_id": "go1.24-race-1.24.13-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.13-160000.1.1.x86_64",
"product": {
"name": "go1.24-1.24.13-160000.1.1.x86_64",
"product_id": "go1.24-1.24.13-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.13-160000.1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.13-160000.1.1.x86_64",
"product_id": "go1.24-doc-1.24.13-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.13-160000.1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.13-160000.1.1.x86_64",
"product_id": "go1.24-libstd-1.24.13-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.13-160000.1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.13-160000.1.1.x86_64",
"product_id": "go1.24-race-1.24.13-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.13-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.13-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.13-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.13-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.13-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.13-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.13-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.13-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.13-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.13-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.13-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.13-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61732"
}
],
"notes": [
{
"category": "general",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61732",
"url": "https://www.suse.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "SUSE Bug 1257692 for CVE-2025-61732",
"url": "https://bugzilla.suse.com/1257692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T11:53:30Z",
"details": "critical"
}
],
"title": "CVE-2025-61732"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T11:53:30Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T11:53:30Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:10064-1
Vulnerability from csaf_opensuse - Published: 2026-01-18 00:00 - Updated: 2026-01-18 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.25-1.25.6-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.25-1.25.6-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10064",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10064-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "go1.25-1.25.6-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-18T00:00:00Z",
"generator": {
"date": "2026-01-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10064-1",
"initial_release_date": "2026-01-18T00:00:00Z",
"revision_history": [
{
"date": "2026-01-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-1.1.aarch64",
"product": {
"name": "go1.25-1.25.6-1.1.aarch64",
"product_id": "go1.25-1.25.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.6-1.1.aarch64",
"product_id": "go1.25-doc-1.25.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.6-1.1.aarch64",
"product_id": "go1.25-libstd-1.25.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.6-1.1.aarch64",
"product_id": "go1.25-race-1.25.6-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-1.1.ppc64le",
"product": {
"name": "go1.25-1.25.6-1.1.ppc64le",
"product_id": "go1.25-1.25.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.6-1.1.ppc64le",
"product_id": "go1.25-doc-1.25.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-1.1.ppc64le",
"product": {
"name": "go1.25-libstd-1.25.6-1.1.ppc64le",
"product_id": "go1.25-libstd-1.25.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.6-1.1.ppc64le",
"product_id": "go1.25-race-1.25.6-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-1.1.s390x",
"product": {
"name": "go1.25-1.25.6-1.1.s390x",
"product_id": "go1.25-1.25.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.6-1.1.s390x",
"product_id": "go1.25-doc-1.25.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-1.1.s390x",
"product": {
"name": "go1.25-libstd-1.25.6-1.1.s390x",
"product_id": "go1.25-libstd-1.25.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-1.1.s390x",
"product": {
"name": "go1.25-race-1.25.6-1.1.s390x",
"product_id": "go1.25-race-1.25.6-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-1.1.x86_64",
"product": {
"name": "go1.25-1.25.6-1.1.x86_64",
"product_id": "go1.25-1.25.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.6-1.1.x86_64",
"product_id": "go1.25-doc-1.25.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.6-1.1.x86_64",
"product_id": "go1.25-libstd-1.25.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.6-1.1.x86_64",
"product_id": "go1.25-race-1.25.6-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64"
},
"product_reference": "go1.25-1.25.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x"
},
"product_reference": "go1.25-1.25.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64"
},
"product_reference": "go1.25-1.25.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le"
},
"product_reference": "go1.25-libstd-1.25.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x"
},
"product_reference": "go1.25-libstd-1.25.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:10233-1
Vulnerability from csaf_opensuse - Published: 2026-02-20 00:00 - Updated: 2026-02-20 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kyverno-1.17.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kyverno-1.17.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10233",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10233-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "kyverno-1.17.1-1.1 on GA media",
"tracking": {
"current_release_date": "2026-02-20T00:00:00Z",
"generator": {
"date": "2026-02-20T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10233-1",
"initial_release_date": "2026-02-20T00:00:00Z",
"revision_history": [
{
"date": "2026-02-20T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kyverno-1.17.1-1.1.aarch64",
"product": {
"name": "kyverno-1.17.1-1.1.aarch64",
"product_id": "kyverno-1.17.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kyverno-bash-completion-1.17.1-1.1.aarch64",
"product": {
"name": "kyverno-bash-completion-1.17.1-1.1.aarch64",
"product_id": "kyverno-bash-completion-1.17.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kyverno-fish-completion-1.17.1-1.1.aarch64",
"product": {
"name": "kyverno-fish-completion-1.17.1-1.1.aarch64",
"product_id": "kyverno-fish-completion-1.17.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kyverno-zsh-completion-1.17.1-1.1.aarch64",
"product": {
"name": "kyverno-zsh-completion-1.17.1-1.1.aarch64",
"product_id": "kyverno-zsh-completion-1.17.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kyverno-1.17.1-1.1.ppc64le",
"product": {
"name": "kyverno-1.17.1-1.1.ppc64le",
"product_id": "kyverno-1.17.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kyverno-bash-completion-1.17.1-1.1.ppc64le",
"product": {
"name": "kyverno-bash-completion-1.17.1-1.1.ppc64le",
"product_id": "kyverno-bash-completion-1.17.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kyverno-fish-completion-1.17.1-1.1.ppc64le",
"product": {
"name": "kyverno-fish-completion-1.17.1-1.1.ppc64le",
"product_id": "kyverno-fish-completion-1.17.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kyverno-zsh-completion-1.17.1-1.1.ppc64le",
"product": {
"name": "kyverno-zsh-completion-1.17.1-1.1.ppc64le",
"product_id": "kyverno-zsh-completion-1.17.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kyverno-1.17.1-1.1.s390x",
"product": {
"name": "kyverno-1.17.1-1.1.s390x",
"product_id": "kyverno-1.17.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kyverno-bash-completion-1.17.1-1.1.s390x",
"product": {
"name": "kyverno-bash-completion-1.17.1-1.1.s390x",
"product_id": "kyverno-bash-completion-1.17.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kyverno-fish-completion-1.17.1-1.1.s390x",
"product": {
"name": "kyverno-fish-completion-1.17.1-1.1.s390x",
"product_id": "kyverno-fish-completion-1.17.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kyverno-zsh-completion-1.17.1-1.1.s390x",
"product": {
"name": "kyverno-zsh-completion-1.17.1-1.1.s390x",
"product_id": "kyverno-zsh-completion-1.17.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kyverno-1.17.1-1.1.x86_64",
"product": {
"name": "kyverno-1.17.1-1.1.x86_64",
"product_id": "kyverno-1.17.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kyverno-bash-completion-1.17.1-1.1.x86_64",
"product": {
"name": "kyverno-bash-completion-1.17.1-1.1.x86_64",
"product_id": "kyverno-bash-completion-1.17.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kyverno-fish-completion-1.17.1-1.1.x86_64",
"product": {
"name": "kyverno-fish-completion-1.17.1-1.1.x86_64",
"product_id": "kyverno-fish-completion-1.17.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kyverno-zsh-completion-1.17.1-1.1.x86_64",
"product": {
"name": "kyverno-zsh-completion-1.17.1-1.1.x86_64",
"product_id": "kyverno-zsh-completion-1.17.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-1.17.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-1.17.1-1.1.aarch64"
},
"product_reference": "kyverno-1.17.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-1.17.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-1.17.1-1.1.ppc64le"
},
"product_reference": "kyverno-1.17.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-1.17.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-1.17.1-1.1.s390x"
},
"product_reference": "kyverno-1.17.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-1.17.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-1.17.1-1.1.x86_64"
},
"product_reference": "kyverno-1.17.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-bash-completion-1.17.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.aarch64"
},
"product_reference": "kyverno-bash-completion-1.17.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-bash-completion-1.17.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.ppc64le"
},
"product_reference": "kyverno-bash-completion-1.17.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-bash-completion-1.17.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.s390x"
},
"product_reference": "kyverno-bash-completion-1.17.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-bash-completion-1.17.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.x86_64"
},
"product_reference": "kyverno-bash-completion-1.17.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-fish-completion-1.17.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.aarch64"
},
"product_reference": "kyverno-fish-completion-1.17.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-fish-completion-1.17.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.ppc64le"
},
"product_reference": "kyverno-fish-completion-1.17.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-fish-completion-1.17.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.s390x"
},
"product_reference": "kyverno-fish-completion-1.17.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-fish-completion-1.17.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.x86_64"
},
"product_reference": "kyverno-fish-completion-1.17.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-zsh-completion-1.17.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.aarch64"
},
"product_reference": "kyverno-zsh-completion-1.17.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-zsh-completion-1.17.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.ppc64le"
},
"product_reference": "kyverno-zsh-completion-1.17.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-zsh-completion-1.17.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.s390x"
},
"product_reference": "kyverno-zsh-completion-1.17.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-zsh-completion-1.17.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.x86_64"
},
"product_reference": "kyverno-zsh-completion-1.17.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:10224-1
Vulnerability from csaf_opensuse - Published: 2026-02-18 00:00 - Updated: 2026-02-18 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "rclone-1.73.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the rclone-1.73.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10224",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10224-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "rclone-1.73.1-1.1 on GA media",
"tracking": {
"current_release_date": "2026-02-18T00:00:00Z",
"generator": {
"date": "2026-02-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10224-1",
"initial_release_date": "2026-02-18T00:00:00Z",
"revision_history": [
{
"date": "2026-02-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.73.1-1.1.aarch64",
"product": {
"name": "rclone-1.73.1-1.1.aarch64",
"product_id": "rclone-1.73.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.73.1-1.1.aarch64",
"product": {
"name": "rclone-bash-completion-1.73.1-1.1.aarch64",
"product_id": "rclone-bash-completion-1.73.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.73.1-1.1.aarch64",
"product": {
"name": "rclone-zsh-completion-1.73.1-1.1.aarch64",
"product_id": "rclone-zsh-completion-1.73.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.73.1-1.1.ppc64le",
"product": {
"name": "rclone-1.73.1-1.1.ppc64le",
"product_id": "rclone-1.73.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.73.1-1.1.ppc64le",
"product": {
"name": "rclone-bash-completion-1.73.1-1.1.ppc64le",
"product_id": "rclone-bash-completion-1.73.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.73.1-1.1.ppc64le",
"product": {
"name": "rclone-zsh-completion-1.73.1-1.1.ppc64le",
"product_id": "rclone-zsh-completion-1.73.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.73.1-1.1.s390x",
"product": {
"name": "rclone-1.73.1-1.1.s390x",
"product_id": "rclone-1.73.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.73.1-1.1.s390x",
"product": {
"name": "rclone-bash-completion-1.73.1-1.1.s390x",
"product_id": "rclone-bash-completion-1.73.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.73.1-1.1.s390x",
"product": {
"name": "rclone-zsh-completion-1.73.1-1.1.s390x",
"product_id": "rclone-zsh-completion-1.73.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.73.1-1.1.x86_64",
"product": {
"name": "rclone-1.73.1-1.1.x86_64",
"product_id": "rclone-1.73.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.73.1-1.1.x86_64",
"product": {
"name": "rclone-bash-completion-1.73.1-1.1.x86_64",
"product_id": "rclone-bash-completion-1.73.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.73.1-1.1.x86_64",
"product": {
"name": "rclone-zsh-completion-1.73.1-1.1.x86_64",
"product_id": "rclone-zsh-completion-1.73.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.73.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.73.1-1.1.aarch64"
},
"product_reference": "rclone-1.73.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.73.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.73.1-1.1.ppc64le"
},
"product_reference": "rclone-1.73.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.73.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.73.1-1.1.s390x"
},
"product_reference": "rclone-1.73.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.73.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.73.1-1.1.x86_64"
},
"product_reference": "rclone-1.73.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.73.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.aarch64"
},
"product_reference": "rclone-bash-completion-1.73.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.73.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.ppc64le"
},
"product_reference": "rclone-bash-completion-1.73.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.73.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.s390x"
},
"product_reference": "rclone-bash-completion-1.73.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.73.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.x86_64"
},
"product_reference": "rclone-bash-completion-1.73.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.73.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.aarch64"
},
"product_reference": "rclone-zsh-completion-1.73.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.73.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.ppc64le"
},
"product_reference": "rclone-zsh-completion-1.73.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.73.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.s390x"
},
"product_reference": "rclone-zsh-completion-1.73.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.73.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.x86_64"
},
"product_reference": "rclone-zsh-completion-1.73.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rclone-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rclone-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:rclone-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:20077-1
Vulnerability from csaf_opensuse - Published: 2026-01-22 12:53 - Updated: 2026-01-22 12:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.12 (released 2026-01-15) (bsc#1236217)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-166",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20077-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2026-01-22T12:53:33Z",
"generator": {
"date": "2026-01-22T12:53:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20077-1",
"initial_release_date": "2026-01-22T12:53:33Z",
"revision_history": [
{
"date": "2026-01-22T12:53:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-doc-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-libstd-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-race-1.24.12-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-1.24.12-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-doc-1.24.12-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-race-1.24.12-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-1.24.12-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-doc-1.24.12-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-race-1.24.12-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-doc-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-libstd-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-race-1.24.12-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:10220-1
Vulnerability from csaf_opensuse - Published: 2026-02-18 00:00 - Updated: 2026-02-18 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "istioctl-1.28.4-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the istioctl-1.28.4-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10220",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10220-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61732 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "istioctl-1.28.4-1.1 on GA media",
"tracking": {
"current_release_date": "2026-02-18T00:00:00Z",
"generator": {
"date": "2026-02-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10220-1",
"initial_release_date": "2026-02-18T00:00:00Z",
"revision_history": [
{
"date": "2026-02-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "istioctl-1.28.4-1.1.aarch64",
"product": {
"name": "istioctl-1.28.4-1.1.aarch64",
"product_id": "istioctl-1.28.4-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "istioctl-bash-completion-1.28.4-1.1.aarch64",
"product": {
"name": "istioctl-bash-completion-1.28.4-1.1.aarch64",
"product_id": "istioctl-bash-completion-1.28.4-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "istioctl-zsh-completion-1.28.4-1.1.aarch64",
"product": {
"name": "istioctl-zsh-completion-1.28.4-1.1.aarch64",
"product_id": "istioctl-zsh-completion-1.28.4-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "istioctl-1.28.4-1.1.ppc64le",
"product": {
"name": "istioctl-1.28.4-1.1.ppc64le",
"product_id": "istioctl-1.28.4-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "istioctl-bash-completion-1.28.4-1.1.ppc64le",
"product": {
"name": "istioctl-bash-completion-1.28.4-1.1.ppc64le",
"product_id": "istioctl-bash-completion-1.28.4-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"product": {
"name": "istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"product_id": "istioctl-zsh-completion-1.28.4-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "istioctl-1.28.4-1.1.s390x",
"product": {
"name": "istioctl-1.28.4-1.1.s390x",
"product_id": "istioctl-1.28.4-1.1.s390x"
}
},
{
"category": "product_version",
"name": "istioctl-bash-completion-1.28.4-1.1.s390x",
"product": {
"name": "istioctl-bash-completion-1.28.4-1.1.s390x",
"product_id": "istioctl-bash-completion-1.28.4-1.1.s390x"
}
},
{
"category": "product_version",
"name": "istioctl-zsh-completion-1.28.4-1.1.s390x",
"product": {
"name": "istioctl-zsh-completion-1.28.4-1.1.s390x",
"product_id": "istioctl-zsh-completion-1.28.4-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "istioctl-1.28.4-1.1.x86_64",
"product": {
"name": "istioctl-1.28.4-1.1.x86_64",
"product_id": "istioctl-1.28.4-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "istioctl-bash-completion-1.28.4-1.1.x86_64",
"product": {
"name": "istioctl-bash-completion-1.28.4-1.1.x86_64",
"product_id": "istioctl-bash-completion-1.28.4-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "istioctl-zsh-completion-1.28.4-1.1.x86_64",
"product": {
"name": "istioctl-zsh-completion-1.28.4-1.1.x86_64",
"product_id": "istioctl-zsh-completion-1.28.4-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-1.28.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64"
},
"product_reference": "istioctl-1.28.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-1.28.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le"
},
"product_reference": "istioctl-1.28.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-1.28.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x"
},
"product_reference": "istioctl-1.28.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-1.28.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64"
},
"product_reference": "istioctl-1.28.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-bash-completion-1.28.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64"
},
"product_reference": "istioctl-bash-completion-1.28.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-bash-completion-1.28.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le"
},
"product_reference": "istioctl-bash-completion-1.28.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-bash-completion-1.28.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x"
},
"product_reference": "istioctl-bash-completion-1.28.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-bash-completion-1.28.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64"
},
"product_reference": "istioctl-bash-completion-1.28.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-zsh-completion-1.28.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64"
},
"product_reference": "istioctl-zsh-completion-1.28.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-zsh-completion-1.28.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le"
},
"product_reference": "istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-zsh-completion-1.28.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x"
},
"product_reference": "istioctl-zsh-completion-1.28.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-zsh-completion-1.28.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
},
"product_reference": "istioctl-zsh-completion-1.28.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61732"
}
],
"notes": [
{
"category": "general",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61732",
"url": "https://www.suse.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "SUSE Bug 1257692 for CVE-2025-61732",
"url": "https://bugzilla.suse.com/1257692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-18T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-61732"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:10063-1
Vulnerability from csaf_opensuse - Published: 2026-01-18 00:00 - Updated: 2026-01-18 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.24-1.24.12-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.24-1.24.12-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10063",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10063-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "go1.24-1.24.12-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-18T00:00:00Z",
"generator": {
"date": "2026-01-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10063-1",
"initial_release_date": "2026-01-18T00:00:00Z",
"revision_history": [
{
"date": "2026-01-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-1.1.aarch64",
"product": {
"name": "go1.24-1.24.12-1.1.aarch64",
"product_id": "go1.24-1.24.12-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.12-1.1.aarch64",
"product_id": "go1.24-doc-1.24.12-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.12-1.1.aarch64",
"product_id": "go1.24-libstd-1.24.12-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.12-1.1.aarch64",
"product_id": "go1.24-race-1.24.12-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-1.1.ppc64le",
"product": {
"name": "go1.24-1.24.12-1.1.ppc64le",
"product_id": "go1.24-1.24.12-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.12-1.1.ppc64le",
"product_id": "go1.24-doc-1.24.12-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-1.1.ppc64le",
"product": {
"name": "go1.24-libstd-1.24.12-1.1.ppc64le",
"product_id": "go1.24-libstd-1.24.12-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.12-1.1.ppc64le",
"product_id": "go1.24-race-1.24.12-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-1.1.s390x",
"product": {
"name": "go1.24-1.24.12-1.1.s390x",
"product_id": "go1.24-1.24.12-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.12-1.1.s390x",
"product_id": "go1.24-doc-1.24.12-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-1.1.s390x",
"product": {
"name": "go1.24-libstd-1.24.12-1.1.s390x",
"product_id": "go1.24-libstd-1.24.12-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-1.1.s390x",
"product": {
"name": "go1.24-race-1.24.12-1.1.s390x",
"product_id": "go1.24-race-1.24.12-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-1.1.x86_64",
"product": {
"name": "go1.24-1.24.12-1.1.x86_64",
"product_id": "go1.24-1.24.12-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.12-1.1.x86_64",
"product_id": "go1.24-doc-1.24.12-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.12-1.1.x86_64",
"product_id": "go1.24-libstd-1.24.12-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.12-1.1.x86_64",
"product_id": "go1.24-race-1.24.12-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64"
},
"product_reference": "go1.24-1.24.12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x"
},
"product_reference": "go1.24-1.24.12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64"
},
"product_reference": "go1.24-1.24.12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le"
},
"product_reference": "go1.24-libstd-1.24.12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x"
},
"product_reference": "go1.24-libstd-1.24.12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:20214-1
Vulnerability from csaf_opensuse - Published: 2026-02-13 10:08 - Updated: 2026-02-13 10:08Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to version 1.25.7.\n\nSecurity issues fixed:\n\n- CVE-2025-61732: cmd/go: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692).\n- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does\n not account for the expiration of full certificate chain (bsc#1256818).\n\nOther updates and bugfixes:\n\n- version update to 1.25.7:\n\n * go#75844 cmd/compile: OOM killed on linux/arm64\n * go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs\n * go#77425 crypto/tls: CL 737700 broke session resumption on macOS\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-269",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20214-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1257692",
"url": "https://bugzilla.suse.com/1257692"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61732 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-02-13T10:08:14Z",
"generator": {
"date": "2026-02-13T10:08:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20214-1",
"initial_release_date": "2026-02-13T10:08:14Z",
"revision_history": [
{
"date": "2026-02-13T10:08:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.7-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.7-160000.1.1.aarch64",
"product_id": "go1.25-1.25.7-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.7-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.7-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.7-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.7-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.7-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.7-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.7-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.7-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.7-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.7-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.7-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.7-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.7-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.7-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.7-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.7-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.7-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.7-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.7-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.7-160000.1.1.s390x",
"product_id": "go1.25-1.25.7-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.7-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.7-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.7-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.7-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.7-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.7-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.7-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.7-160000.1.1.x86_64",
"product_id": "go1.25-1.25.7-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.7-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.7-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.7-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.7-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.7-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.7-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.7-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.7-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.7-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.7-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.7-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.7-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.7-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.7-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.7-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.7-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.7-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.7-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.7-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.7-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.7-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.7-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.7-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.7-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.7-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.7-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.7-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.7-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.7-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.7-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.7-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.7-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.7-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.7-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.7-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.7-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.7-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61732"
}
],
"notes": [
{
"category": "general",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61732",
"url": "https://www.suse.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "SUSE Bug 1257692 for CVE-2025-61732",
"url": "https://bugzilla.suse.com/1257692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T10:08:14Z",
"details": "critical"
}
],
"title": "CVE-2025-61732"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T10:08:14Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:20085-1
Vulnerability from csaf_opensuse - Published: 2026-01-22 15:49 - Updated: 2026-01-22 15:49Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.6 (released 2026-01-15) (bsc#1244485)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-174",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20085-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-01-22T15:49:20Z",
"generator": {
"date": "2026-01-22T15:49:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20085-1",
"initial_release_date": "2026-01-22T15:49:20Z",
"revision_history": [
{
"date": "2026-01-22T15:49:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.6-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.6-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.6-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.6-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-1.25.6-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.6-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.6-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.6-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
GHSA-H355-32PF-P2XM
Vulnerability from github – Published: 2026-02-05 18:30 – Updated: 2026-02-06 18:30During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
{
"affected": [],
"aliases": [
"CVE-2025-68121"
],
"database_specific": {
"cwe_ids": [
"CWE-295"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-02-05T18:16:10Z",
"severity": "MODERATE"
},
"details": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"id": "GHSA-h355-32pf-p2xm",
"modified": "2026-02-06T18:30:31Z",
"published": "2026-02-05T18:30:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://go.dev/cl/737700"
},
{
"type": "WEB",
"url": "https://go.dev/issue/77217"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
bit-golang-2025-68121
Vulnerability from bitnami_vulndb
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "golang",
"purl": "pkg:bitnami/golang"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.13"
},
{
"introduced": "1.25.0-0"
},
{
"fixed": "1.25.7"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2025-68121"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
],
"severity": "Critical"
},
"details": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"id": "BIT-golang-2025-68121",
"modified": "2026-02-11T09:09:18.507Z",
"published": "2026-02-10T10:05:16.474Z",
"references": [
{
"type": "WEB",
"url": "https://go.dev/cl/737700"
},
{
"type": "WEB",
"url": "https://go.dev/issue/77217"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"schema_version": "1.6.2",
"summary": "Unexpected session resumption in crypto/tls"
}
WID-SEC-W-2026-0345
Vulnerability from csaf_certbund - Published: 2026-02-08 23:00 - Updated: 2026-02-23 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Sicherheitsma\u00dfnahmen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0345 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0345.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0345 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0345"
},
{
"category": "external",
"summary": "Golang Announce vom 2026-02-08",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "OSS Mailing List vom 2026-02-08",
"url": "https://seclists.org/oss-sec/2026/q1/147"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0426-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024120.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0427-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024119.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2706 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2708 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20214-1 vom 2026-02-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQX4ETITXJH3KBGH7YHJSZKMZNKVQRWR/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20220-1 vom 2026-02-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4EVFYENISTE7WMVDTI7MTPTDXI7IJQ2/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2706 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2706.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2708 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2708.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2709 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2709.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2709 vom 2026-02-17",
"url": "https://errata.build.resf.org/RLSA-2026:2709"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2706 vom 2026-02-17",
"url": "https://errata.build.resf.org/RLSA-2026:2706"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2708 vom 2026-02-17",
"url": "https://errata.build.resf.org/RLSA-2026:2708"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-091 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-091.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2914 vom 2026-02-19",
"url": "https://linux.oracle.com/errata/ELSA-2026-2914.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2920 vom 2026-02-19",
"url": "https://linux.oracle.com/errata/ELSA-2026-2920.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-090 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-089 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-089.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20428-1 vom 2026-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024344.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20429-1 vom 2026-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024343.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2026-096 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-096.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3172 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3172.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10220-1 vom 2026-02-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7N2QLT4QQIZC6RCBGA4LQNAUW5NSKRS/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10224-1 vom 2026-02-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4XIIXIOQEITZJFXXLA5XOCW3MWGG7L/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3035 vom 2026-02-24",
"url": "http://linux.oracle.com/errata/ELSA-2026-3035.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3092 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3092"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3040 vom 2026-02-24",
"url": "http://linux.oracle.com/errata/ELSA-2026-3040.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3092 vom 2026-02-24",
"url": "http://linux.oracle.com/errata/ELSA-2026-3092.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3089 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3089"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-23T23:00:00.000+00:00",
"generator": {
"date": "2026-02-24T08:42:23.326+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0345",
"initial_release_date": "2026-02-08T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-08T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat und openSUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon, Oracle Linux und SUSE aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.25.7",
"product": {
"name": "Golang Go \u003c1.25.7",
"product_id": "T050609"
}
},
{
"category": "product_version",
"name": "1.25.7",
"product": {
"name": "Golang Go 1.25.7",
"product_id": "T050609-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.25.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.24.13",
"product": {
"name": "Golang Go \u003c1.24.13",
"product_id": "T050610"
}
},
{
"category": "product_version",
"name": "1.24.13",
"product": {
"name": "Golang Go 1.24.13",
"product_id": "T050610-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.24.13"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61732",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T027843",
"398363",
"T050610",
"T004914",
"T032255",
"T050609"
]
},
"release_date": "2026-02-08T23:00:00.000+00:00",
"title": "CVE-2025-61732"
},
{
"cve": "CVE-2025-68121",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T027843",
"398363",
"T050610",
"T004914",
"T032255",
"T050609"
]
},
"release_date": "2026-02-08T23:00:00.000+00:00",
"title": "CVE-2025-68121"
}
]
}
WID-SEC-W-2026-0129
Vulnerability from csaf_certbund - Published: 2026-01-15 23:00 - Updated: 2026-02-23 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten zu manipulieren oder vertrauliche Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0129 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0129.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0129 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0129"
},
{
"category": "external",
"summary": "Go 1.25.6 and Go 1.24.12 release notes vom 2026-01-15",
"url": "https://seclists.org/oss-sec/2026/q1/68"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77101 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77101"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77102 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77102"
},
{
"category": "external",
"summary": "GitHub Golang Issue 76443 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/76443"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77100 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77100"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77099 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77099"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77113 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77113"
},
{
"category": "external",
"summary": "CoreDNS-1.14.1 Release Notes vom 2026-01-19",
"url": "https://coredns.io/2026/01/15/coredns-1.14.-release/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10063-1 vom 2026-01-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NH2ETRY5I4475P2G36TA426YNBGAZLJM/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10064-1 vom 2026-01-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJZDHBHKXYC7TOPJZKAU6QZKMN53VSVC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0219-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0218-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0298-1 vom 2026-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Q63UO2LYEIXNPXRBOE6F42PWFVTQ6LQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0297-1 vom 2026-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0296-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0308-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20122-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023968.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10101-1 vom 2026-01-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQGDE5WRPP6NKEPWSYQ5WAJ54HTZCN45/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20132-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023959.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:0032-1 vom 2026-01-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YIDNEL2XD2C3R7XQHANV23SKGOE6VLD6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0354-1 vom 2026-02-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024002.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2026-095 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-095.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3135 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3135.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3134 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3134.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2026-096 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-096.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3138 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3138.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3137 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3137.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3136 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3136.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3146 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3146.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0403-1 vom 2026-02-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0426-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024120.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0427-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024119.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2708 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20220-1 vom 2026-02-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4EVFYENISTE7WMVDTI7MTPTDXI7IJQ2/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20214-1 vom 2026-02-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQX4ETITXJH3KBGH7YHJSZKMZNKVQRWR/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2706 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2754 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2706 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2706.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2681 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2709 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2709.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2708 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2708.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2708 vom 2026-02-17",
"url": "https://errata.build.resf.org/RLSA-2026:2708"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2709 vom 2026-02-17",
"url": "https://errata.build.resf.org/RLSA-2026:2709"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2706 vom 2026-02-17",
"url": "https://errata.build.resf.org/RLSA-2026:2706"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3174 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3174.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2026-096 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-096.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20429-1 vom 2026-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024343.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20428-1 vom 2026-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024344.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-087 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-087.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-088 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-088.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-089 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-089.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-090 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-091 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-091.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-092 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-092.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2920 vom 2026-02-19",
"url": "https://linux.oracle.com/errata/ELSA-2026-2920.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2914 vom 2026-02-19",
"url": "https://linux.oracle.com/errata/ELSA-2026-2914.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10220-1 vom 2026-02-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7N2QLT4QQIZC6RCBGA4LQNAUW5NSKRS/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10224-1 vom 2026-02-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4XIIXIOQEITZJFXXLA5XOCW3MWGG7L/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3035 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3035"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3040 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3040"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3089 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3089"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3092 vom 2026-02-24",
"url": "http://linux.oracle.com/errata/ELSA-2026-3092.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3040 vom 2026-02-24",
"url": "http://linux.oracle.com/errata/ELSA-2026-3040.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3035 vom 2026-02-24",
"url": "http://linux.oracle.com/errata/ELSA-2026-3035.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3092 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3092"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-23T23:00:00.000+00:00",
"generator": {
"date": "2026-02-24T08:48:15.200+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0129",
"initial_release_date": "2026-01-15T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-15T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE, European Union Vulnerability Database und openSUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon, Go und European Union Vulnerability Database aufgenommen"
},
{
"date": "2026-02-08T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat und openSUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Amazon, SUSE und Oracle Linux aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "17"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.25.6",
"product": {
"name": "Golang Go \u003c1.25.6",
"product_id": "T050049"
}
},
{
"category": "product_version",
"name": "1.25.6",
"product": {
"name": "Golang Go 1.25.6",
"product_id": "T050049-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.25.6"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.24.12",
"product": {
"name": "Golang Go \u003c1.24.12",
"product_id": "T050051"
}
},
{
"category": "product_version",
"name": "1.24.12",
"product": {
"name": "Golang Go 1.24.12",
"product_id": "T050051-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.24.12"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.14.1",
"product": {
"name": "Open Source CoreDNS \u003c1.14.1",
"product_id": "T050073"
}
},
{
"category": "product_version",
"name": "1.14.1",
"product": {
"name": "Open Source CoreDNS 1.14.1",
"product_id": "T050073-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:coredns:coredns:1.14.1"
}
}
}
],
"category": "product_name",
"name": "CoreDNS"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914",
"T032255"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914",
"T032255"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914",
"T032255"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914",
"T032255"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914",
"T032255"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914",
"T032255"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-68121"
}
]
}
CERTFR-2026-AVI-0218
Vulnerability from certfr_avis - Published: 2026-02-26 - Updated: 2026-02-26
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Platform Services pour Tanzu Platform versions antérieures à 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.5 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.12.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 4.3.2 sur Kubernetes | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.238.x | ||
| VMware | Workstation | Workstation versions antérieures à 25H2u1 | ||
| VMware | Fusion | Fusion versions antérieures à 25H2u1 sur MacOS | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.1065.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.16.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Windows) versions antérieures à 2019.95.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.8.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 14.21.0 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Platform Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.12.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 4.3.2 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.2.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.238.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Workstation versions ant\u00e9rieures \u00e0 25H2u1",
"product": {
"name": "Workstation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions ant\u00e9rieures \u00e0 25H2u1 sur MacOS",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.1065.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.16.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.95.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.8.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 14.21.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2026-22722",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22722"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-62727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62727"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2025-58190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58190"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2022-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2255"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7545"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-47008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47008"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-11840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11840"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38417"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-1181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1181"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2023-25586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25586"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2017-20052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-20052"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-0840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0840"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2025-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1179"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2026-22715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22715"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-47007",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47007"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-25433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2022-4285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4285"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2026-22716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22716"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"name": "CVE-2022-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47695"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2022-50458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50458"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2026-0994",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0994"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2016-9840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9840"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2023-53107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53107"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1182"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2008-0888",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0888"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2023-25584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25584"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-11082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11082"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-1149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1149"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2022-50444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50444"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2021-46174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46174"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53164"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2023-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26966"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2022-48065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48065"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2022-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47696"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2022-35205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35205"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2025-1178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1178"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-1176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1176"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2025-12119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12119"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-34410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34410"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-47911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47911"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2022-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49920"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2022-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50247"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-12383",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12383"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2023-52355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2022-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50249"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2023-53182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53182"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2025-11083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11083"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-33285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33285"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-11081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11081"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2026-22184",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22184"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2022-48063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48063"
},
{
"name": "CVE-2024-53589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53589"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2023-32181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32181"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-11495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11495"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2019-9076",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9076"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2021-20205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20205"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2022-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50250"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2021-29390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29390"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2021-20284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20284"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2023-32573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32573"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2020-19726",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19726"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-47010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47010"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2022-33070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33070"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2024-57360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57360"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2023-37369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37369"
},
{
"name": "CVE-2024-48615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48615"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-25588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-0665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2018-9996",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9996"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2025-8225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8225"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2025-8224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8224"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5245"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2025-11966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11966"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2022-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47011"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-12194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12194"
},
{
"name": "CVE-2021-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3549"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-5244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5244"
},
{
"name": "CVE-2021-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37972"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2023-4863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2025-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1153"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2022-35206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35206"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2022-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38533"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2023-36660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36660"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-25585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25585"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-3198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3198"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2026-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2007"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-11839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11839"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2024-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2026-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0900"
},
{
"name": "CVE-2020-16599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16599"
},
{
"name": "CVE-2021-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46822"
},
{
"name": "CVE-2022-45703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45703"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2022-47673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47673"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2021-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20197"
},
{
"name": "CVE-2023-24056",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
},
{
"name": "CVE-2026-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0902"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2026-22717",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22717"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-29480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29480"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2023-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1999"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-7546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7546"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2025-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1148"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2023-1579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2021-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43396"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2023-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38197"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-64702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64702"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-26T00:00:00",
"last_revision_date": "2026-02-26T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0218",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37096"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37092"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37102"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37078"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37109"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37087",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37087"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37090",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37090"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37077",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37077"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37098"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37079",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37079"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37101"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37104",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37104"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37080",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37080"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37097"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37083",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37083"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37086",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37086"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37082",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37082"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37100"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37099"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37081",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37081"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37089",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37089"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37076",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37076"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37088",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37088"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36986",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37103"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37084",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37084"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37110"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37093"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37085",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37085"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37095"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37094"
}
]
}
CERTFR-2026-AVI-0199
Vulnerability from certfr_avis - Published: 2026-02-24 - Updated: 2026-02-24
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Telco Cloud Platform | Telco Cloud Platform versions 4.x et 5.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Data Services | Tanzu Data Flow versions antérieures à 2.0.2 sur Tanzu Platform | ||
| VMware | Azure Spring Enterprise | Harbor Registry versions antérieures à 2.14.2 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour MySQL versions 2.0.0 sur Kubernetes | ||
| VMware | Cloud Foundation | Cloud Foundation versions 9.x antérieures à 9.0.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | App Metrics versions antérieures à2.3.3 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire versions antérieures à 2.6.1 sur Kubernetes | ||
| VMware | Tanzu Kubernetes Runtime | CredHub Secrets Management pour Tanzu Platform versions antérieures à 1.6.8 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 3.3.1 sur Kubernetes | ||
| VMware | Tanzu Operations Manager | Foundation Core pour Tanzu Platform versions antérieures à 3.2.4 | ||
| VMware | Aria Operations | Aria Operations versions 8.x antérieures à 8.18.6 | ||
| VMware | Tanzu Kubernetes Runtime | cf-mgmt pour Tanzu Platform versions antérieures à 1.0.108 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 9.0.1 | ||
| VMware | Tanzu Kubernetes Runtime | Extended App Support pour Tanzu Platform versions antérieures à 1.0.15 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire Management versions antérieures à 1.4.3 | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.77 | ||
| VMware | Tanzu Kubernetes Runtime | Cloud Native Buildpacks pour Tanzu Platform versions antérieures à 0.6.5 | ||
| VMware | Cloud Foundation | Cloud Foundation versions 4.x et 5.x sans le correctif de sécurité KB92148 | ||
| VMware | Tanzu Kubernetes Runtime | AI Services pour Tanzu Platform versions antérieures à 10.3.4 | ||
| VMware | Tanzu Kubernetes Runtime | Java Buildpack versions antérieures à 4.89.0 | ||
| VMware | Telco Cloud Infrastructure | Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Telco Cloud Platform versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow versions ant\u00e9rieures \u00e0 2.0.2 sur Tanzu Platform",
"product": {
"name": "Tanzu Data Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Harbor Registry versions ant\u00e9rieures \u00e0 2.14.2",
"product": {
"name": "Azure Spring Enterprise",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour MySQL versions 2.0.0 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 9.x ant\u00e9rieures \u00e0 9.0.2.0",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Metrics versions ant\u00e9rieures \u00e02.3.3",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 2.6.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.8",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 3.3.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.4",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Aria Operations versions 8.x ant\u00e9rieures \u00e0 8.18.6",
"product": {
"name": "Aria Operations",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "cf-mgmt pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.108",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 9.0.1",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.15",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Management versions ant\u00e9rieures \u00e0 1.4.3",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.77",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Native Buildpacks pour Tanzu Platform versions ant\u00e9rieures \u00e0 0.6.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB92148",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.89.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Infrastructure",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47219"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2017-16544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16544"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2022-24450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24450"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2020-10750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10750"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41091"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2018-1000517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000517"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10543"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2019-5481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5481"
},
{
"name": "CVE-2025-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26646"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-29222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29222"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-29190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29190"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2018-20679",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20679"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2017-15873",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15873"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-22719",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22719"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-39399",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39399"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2023-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22041"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2023-47090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47090"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2022-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29946"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-30215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30215"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-22036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22036"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2022-26652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26652"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2023-42365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42365"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2025-68146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68146"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2017-15874",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15874"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2026-22721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22721"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2022-48174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48174"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2023-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21835"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41089"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2023-42364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42364"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2019-5747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5747"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2018-1000500",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2026-26014",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26014"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2026-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21941"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2026-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21947"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2019-5443",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5443"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2023-22006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22006"
},
{
"name": "CVE-2019-5435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5435"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2026-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22720"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-42363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42363"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29189"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-24T00:00:00",
"last_revision_date": "2026-02-24T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0199",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37012",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37012"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37001",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37001"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37013",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37013"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37003",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37003"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37023",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37023"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37017",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37017"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37006",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37006"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37024",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37024"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36997",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36997"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37004",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37004"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36947",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37018",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37018"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37005",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37005"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37008",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37008"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37007",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37007"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37020",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37020"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36998",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36998"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37002",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37002"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37021",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37021"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37022",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37022"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37016",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37016"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37019",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37019"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37010",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37010"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37009",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37009"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37000",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37000"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37011",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37011"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37015",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37015"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37014",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37014"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36999",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36999"
}
]
}
CERTFR-2026-AVI-0209
Vulnerability from certfr_avis - Published: 2026-02-25 - Updated: 2026-02-25
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour Tanzu versions antérieures à 1.14.11 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour Tanzu Platform versions antérieures à 1.16.17 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.60 | ||
| VMware | Tanzu Kubernetes Runtime | Isolation Segmentation pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.3.5 et 10.2.8+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Automation Toolkit versions antérieures à 5.4.2 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.80 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour Tanzu Platform versions antérieures à 2.4.2 | ||
| VMware | Tanzu Kubernetes Runtime | Compliance Scanning pour Tanzu Platform versions antérieures à 1.3.29 | ||
| VMware | Tanzu Kubernetes Runtime | Greffon Elastic Application Runtime Windows pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions 1.1065.x sans les derniers correctifs de sécurité | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour Tanzu Platform versions antérieures à 250.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Application Services pour Tanzu Platform versions antérieures à 3.3.15 | ||
| VMware | Tanzu Kubernetes Runtime | Scheduler pour Tanzu Platform versions antérieures à 2.0.24 | ||
| VMware | Tanzu Kubernetes Runtime | Service Publisher for VMware Tanzu Platform versions antérieures à 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Anti-Virus Scanning pour Tanzu Platform versions antérieures à 2.4.3 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions 1.1065.x sans les derniers correctifs de sécurité | ||
| VMware | Tanzu Kubernetes Runtime | File Integrity Monitoring pour Tanzu Platform versions antérieures à 2.1.50 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions 1.1033.x sans les derniers correctifs de sécurité | ||
| VMware | Tanzu Kubernetes Runtime | Metric Store versions antérieures à 1.8.2 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.65 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Spring Cloud Data Flow pour Tanzu versions ant\u00e9rieures \u00e0 1.14.11",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.17",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.60",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.3.5 et 10.2.8+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.4.2",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.80",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.2",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Compliance Scanning pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.3.29",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Greffon Elastic Application Runtime Windows pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions 1.1065.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour Tanzu Platform versions ant\u00e9rieures \u00e0 250.6.6",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Application Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 3.3.15",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler pour Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.24",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Service Publisher for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Anti-Virus Scanning pour Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.3",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions 1.1065.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "File Integrity Monitoring pour Tanzu Platform versions ant\u00e9rieures \u00e0 2.1.50",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions 1.1033.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Metric Store versions ant\u00e9rieures \u00e0 1.8.2",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.65",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2023-29408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29408"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2026-21226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21226"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2023-29407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29407"
},
{
"name": "CVE-2026-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26958"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2023-42365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42365"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-41253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41253"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2022-48174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48174"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2023-42364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42364"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2024-24792",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24792"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2025-69277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69277"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-41727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41727"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-42363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42363"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-25T00:00:00",
"last_revision_date": "2026-02-25T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0209",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37064",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37064"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37049",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37049"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37075",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37075"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37071",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37071"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37054",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37054"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37069",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37069"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37067",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37067"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37032",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37032"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37028",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37028"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37063",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37063"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37027",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37027"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37059",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37059"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37042",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37042"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37026",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37026"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37060",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37060"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37048",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37048"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37034",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37034"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37065",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37065"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37040",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37040"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37074",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37074"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37057",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37057"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37070",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37070"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37043",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37043"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37037",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37037"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37061",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37061"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37051",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37051"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37053",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37053"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37035",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37035"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37036",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37036"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37041",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37041"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37062",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37062"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37038",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37038"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37055",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37055"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37025",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37025"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37029",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37029"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37045",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37045"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37044",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37044"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37072",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37072"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37046",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37046"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37058",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37058"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37066",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37066"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37068",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37068"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37052",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37052"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37033",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37033"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37073",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37073"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37056",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37056"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37050",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37050"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37030",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37030"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37031",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37031"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37039",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37039"
}
]
}
CERTFR-2026-AVI-0191
Vulnerability from certfr_avis - Published: 2026-02-20 - Updated: 2026-02-20
Une vulnérabilité a été découverte dans Traefik. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Traefik versions v2.x ant\u00e9rieures \u00e0 v2.11.37",
"product": {
"name": "Traefik",
"vendor": {
"name": "Traefik",
"scada": false
}
}
},
{
"description": "Traefik versions v3.x ant\u00e9rieures \u00e0 v3.6.8",
"product": {
"name": "Traefik",
"vendor": {
"name": "Traefik",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
}
],
"initial_release_date": "2026-02-20T00:00:00",
"last_revision_date": "2026-02-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0191",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Traefik. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans Traefik",
"vendor_advisories": [
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Traefik GHSA-gv8r-9rw9-9697",
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-gv8r-9rw9-9697"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.